Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-9788 (GCVE-0-2017-9788)
Vulnerability from cvelistv5
- Uninitialized memory reflection in mod_auth_digest
 
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | 
                    
                      
                        
                          Version: 2.2.0 to 2.2.33 Version: 2.4.1 to 2.4.26  | 
                  
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:18:02.177Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2017:3113",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:3113"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.apple.com/HT208221"
          },
          {
            "name": "RHSA-2017:2479",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:2479"
          },
          {
            "name": "RHSA-2017:2483",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:2483"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20170911-0002/"
          },
          {
            "name": "RHSA-2017:3240",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:3240"
          },
          {
            "name": "RHSA-2017:2709",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:2709"
          },
          {
            "name": "RHSA-2017:3195",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:3195"
          },
          {
            "name": "[announce] 20170713 CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E"
          },
          {
            "name": "99569",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/99569"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
          },
          {
            "name": "RHSA-2017:3239",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:3239"
          },
          {
            "name": "RHSA-2017:3114",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:3114"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
          },
          {
            "name": "RHSA-2017:3194",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:3194"
          },
          {
            "name": "1038906",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038906"
          },
          {
            "name": "RHSA-2017:3193",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:3193"
          },
          {
            "name": "RHSA-2017:2710",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:2710"
          },
          {
            "name": "DSA-3913",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3913"
          },
          {
            "name": "RHSA-2017:2708",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:2708"
          },
          {
            "name": "GLSA-201710-32",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201710-32"
          },
          {
            "name": "RHSA-2017:2478",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2017:2478"
          },
          {
            "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.tenable.com/security/tns-2019-09"
          },
          {
            "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210422 svn commit: r1074079 [2/3] - in /websites/staging/httpd/trunk/content: ./ apreq/ contribute/ contributors/ dev/ docs-project/ docs/ info/ mod_fcgid/ mod_ftp/ mod_mbox/ mod_smtpd/ modules/ security/ test/ test/flood/",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Apache HTTP Server",
          "vendor": "Apache Software Foundation",
          "versions": [
            {
              "status": "affected",
              "version": "2.2.0 to 2.2.33"
            },
            {
              "status": "affected",
              "version": "2.4.1 to 2.4.26"
            }
          ]
        }
      ],
      "datePublic": "2017-07-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Uninitialized memory reflection in mod_auth_digest",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-06T10:11:42",
        "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
        "shortName": "apache"
      },
      "references": [
        {
          "name": "RHSA-2017:3113",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.apple.com/HT208221"
        },
        {
          "name": "RHSA-2017:2479",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        },
        {
          "name": "RHSA-2017:2483",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20170911-0002/"
        },
        {
          "name": "RHSA-2017:3240",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "name": "RHSA-2017:2709",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:2709"
        },
        {
          "name": "RHSA-2017:3195",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        },
        {
          "name": "[announce] 20170713 CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E"
        },
        {
          "name": "99569",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/99569"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
        },
        {
          "name": "RHSA-2017:3239",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "name": "RHSA-2017:3114",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        },
        {
          "name": "RHSA-2017:3194",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        },
        {
          "name": "1038906",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038906"
        },
        {
          "name": "RHSA-2017:3193",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        },
        {
          "name": "RHSA-2017:2710",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:2710"
        },
        {
          "name": "DSA-3913",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3913"
        },
        {
          "name": "RHSA-2017:2708",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:2708"
        },
        {
          "name": "GLSA-201710-32",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201710-32"
        },
        {
          "name": "RHSA-2017:2478",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        },
        {
          "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.tenable.com/security/tns-2019-09"
        },
        {
          "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210422 svn commit: r1074079 [2/3] - in /websites/staging/httpd/trunk/content: ./ apreq/ contribute/ contributors/ dev/ docs-project/ docs/ info/ mod_fcgid/ mod_ftp/ mod_mbox/ mod_smtpd/ modules/ security/ test/ test/flood/",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
        },
        {
          "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@apache.org",
          "DATE_PUBLIC": "2017-07-13T00:00:00",
          "ID": "CVE-2017-9788",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Apache HTTP Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.2.0 to 2.2.33"
                          },
                          {
                            "version_value": "2.4.1 to 2.4.26"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Apache Software Foundation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Uninitialized memory reflection in mod_auth_digest"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2017:3113",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:3113"
            },
            {
              "name": "https://support.apple.com/HT208221",
              "refsource": "CONFIRM",
              "url": "https://support.apple.com/HT208221"
            },
            {
              "name": "RHSA-2017:2479",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:2479"
            },
            {
              "name": "RHSA-2017:2483",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:2483"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us"
            },
            {
              "name": "https://httpd.apache.org/security/vulnerabilities_22.html",
              "refsource": "CONFIRM",
              "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20170911-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20170911-0002/"
            },
            {
              "name": "RHSA-2017:3240",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:3240"
            },
            {
              "name": "RHSA-2017:2709",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:2709"
            },
            {
              "name": "RHSA-2017:3195",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:3195"
            },
            {
              "name": "[announce] 20170713 CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E"
            },
            {
              "name": "99569",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/99569"
            },
            {
              "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
            },
            {
              "name": "RHSA-2017:3239",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:3239"
            },
            {
              "name": "RHSA-2017:3114",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:3114"
            },
            {
              "name": "https://httpd.apache.org/security/vulnerabilities_24.html",
              "refsource": "CONFIRM",
              "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
            },
            {
              "name": "RHSA-2017:3194",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:3194"
            },
            {
              "name": "1038906",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038906"
            },
            {
              "name": "RHSA-2017:3193",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:3193"
            },
            {
              "name": "RHSA-2017:2710",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:2710"
            },
            {
              "name": "DSA-3913",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3913"
            },
            {
              "name": "RHSA-2017:2708",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:2708"
            },
            {
              "name": "GLSA-201710-32",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201710-32"
            },
            {
              "name": "RHSA-2017:2478",
              "refsource": "REDHAT",
              "url": "https://access.redhat.com/errata/RHSA-2017:2478"
            },
            {
              "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "https://www.tenable.com/security/tns-2019-09",
              "refsource": "CONFIRM",
              "url": "https://www.tenable.com/security/tns-2019-09"
            },
            {
              "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210422 svn commit: r1074079 [2/3] - in /websites/staging/httpd/trunk/content: ./ apreq/ contribute/ contributors/ dev/ docs-project/ docs/ info/ mod_fcgid/ mod_ftp/ mod_mbox/ mod_smtpd/ modules/ security/ test/ test/flood/",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
    "assignerShortName": "apache",
    "cveId": "CVE-2017-9788",
    "datePublished": "2017-07-13T16:00:00Z",
    "dateReserved": "2017-06-21T00:00:00",
    "dateUpdated": "2024-09-16T17:53:37.547Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-9788\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2017-07-13T16:29:00.227\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.\"},{\"lang\":\"es\",\"value\":\"En Apache httpd, en versiones anteriores a la 2.2.34 y en versiones 2.4.x anteriores a la 2.4.27, el valor placeholder en cabeceras [Proxy-]Authorization del tipo \u0027Digest\u0027 no se inicializ\u00f3 o reinici\u00f3 antes de o entre las asignaciones sucesivas key=value por mod_auth_digest. Proporcionar una clave inicial sin asignaci\u00f3n \\\"=\\\" podr\u00eda reflejar el valor obsoleto de la memoria agrupada no inicializada utilizada por la petici\u00f3n anterior. Esto podr\u00eda dar lugar al filtrado de informaci\u00f3n potencialmente confidencial y, en otros casos, a un fallo de segmentaci\u00f3n que dar\u00eda como resultado una denegaci\u00f3n de servicio (DoS)\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.2.33\",\"matchCriteriaId\":\"BF02A472-9FEE-4796-B9B6-DEF9FB20AFE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndIncluding\":\"2.4.26\",\"matchCriteriaId\":\"B4F38A30-B7C6-4F9E-BFE0-B8481B0EAD26\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.13.1\",\"matchCriteriaId\":\"C43CA59D-847F-4225-A7A6-02DEB1BB4F64\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*\",\"matchCriteriaId\":\"3FA5E22C-489B-4C5F-A5F3-C03F45CA8811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B7A6697-98CC-4E36-93DB-B7160F8399F9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C81647C-9A53-481D-A54C-36770A093F90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B067C7-735E-43C9-9188-7E1522A02491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6755B6AD-0422-467B-8115-34A60B1D1A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F7E11E-FB34-4467-8919-2B6BEAABF665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2466282-51AB-478D-9FF4-FA524265ED2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B142ACCC-F7A9-4A3B-BE60-0D6691D5058D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1ABA871-3271-48E2-A69C-5AD70AF94E53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"681173DF-537E-4A64-8FC7-75F439CCAD0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:secure_global_desktop:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B4B4E96-1F12-4719-BDB7-4ED5D3DCF9ED\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3913\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99569\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038906\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2478\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2479\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2483\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2708\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2709\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2710\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3113\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3114\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3193\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3194\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3195\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3239\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3240\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_22.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"security@apache.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://security.gentoo.org/glsa/201710-32\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20170911-0002/\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2019-09\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3913\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99569\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038906\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2478\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2483\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2708\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2709\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:2710\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3113\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3114\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3194\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3239\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:3240\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_22.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://httpd.apache.org/security/vulnerabilities_24.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201710-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20170911-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2019-09\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}
  rhsa-2017:2708
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Core Services.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2 serves as an update for Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2708",
        "url": "https://access.redhat.com/errata/RHSA-2017:2708"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
      },
      {
        "category": "external",
        "summary": "1243888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "JBCS-329",
        "url": "https://issues.redhat.com/browse/JBCS-329"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2708.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services security update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:12+00:00",
      "generator": {
        "date": "2025-10-10T01:58:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2708",
      "initial_release_date": "2017-09-13T16:37:52+00:00",
      "revision_history": [
        {
          "date": "2017-09-13T16:37:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-09-13T16:37:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Text-Only JBCS",
                "product": {
                  "name": "Text-Only JBCS",
                  "product_id": "Text-Only JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-3185",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2015-07-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1243888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Text-Only JBCS"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "RHBZ#1243888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16",
          "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16"
        }
      ],
      "release_date": "2015-07-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:37:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Text-Only JBCS"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2708"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Text-Only JBCS"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Text-Only JBCS"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:37:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Text-Only JBCS"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2708"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "Text-Only JBCS"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Text-Only JBCS"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Text-Only JBCS"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:37:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Text-Only JBCS"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2708"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "Text-Only JBCS"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Text-Only JBCS"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  RHSA-2017:3240
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 and Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 21st November 2017]\nPreviously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.\n\nThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nThis release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3240",
        "url": "https://access.redhat.com/errata/RHSA-2017:3240"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3229231",
        "url": "https://access.redhat.com/articles/3229231"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1508880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508880"
      },
      {
        "category": "external",
        "summary": "1508884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508884"
      },
      {
        "category": "external",
        "summary": "1508885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508885"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3240.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:16+00:00",
      "generator": {
        "date": "2025-10-10T01:58:16+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3240",
      "initial_release_date": "2017-11-16T19:27:22+00:00",
      "revision_history": [
        {
          "date": "2017-11-16T19:27:22+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-21T18:17:26+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:16+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
                  "product_id": "6Server-JBEAP-6.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
                  "product_id": "7Server-JBEAP-6.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Enterprise Application Platform"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.26-58.ep6.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-tools@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.26-58.ep6.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap22@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-tools@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.src",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:27:22+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. The JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:27:22+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. The JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:27:22+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. The JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  rhsa-2017_3114
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Web Server 2.1.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThis release provides an update to httpd, OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2. The updates are documented in the Release Notes document linked to in the References.\n\nThis release of Red Hat JBoss Web Server 2.1.2 Service Pack 2 serves as a update for Red Hat JBoss Web Server 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nUsers of Red Hat JBoss Web Server 2 should upgrade to these updated packages, which resolve several security issues\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12617)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1338640)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1448709)\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1493075)\n\n* The jboss-ews-application-servers zip README contains incomplete description of fixed CVEs (BZ#1497953)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3114",
        "url": "https://access.redhat.com/errata/RHSA-2017:3114"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=2.1.2",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=2.1.2"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3227901",
        "url": "https://access.redhat.com/articles/3227901"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1493075",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493075"
      },
      {
        "category": "external",
        "summary": "1493220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
      },
      {
        "category": "external",
        "summary": "1494283",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
      },
      {
        "category": "external",
        "summary": "1497953",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497953"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3114.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update",
    "tracking": {
      "current_release_date": "2024-12-22T18:31:41+00:00",
      "generator": {
        "date": "2024-12-22T18:31:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.4"
        }
      },
      "id": "RHSA-2017:3114",
      "initial_release_date": "2017-11-02T19:04:48+00:00",
      "revision_history": [
        {
          "date": "2017-11-02T19:04:48+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-02T19:04:48+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-22T18:31:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 2.1",
                "product": {
                  "name": "Red Hat JBoss Web Server 2.1",
                  "product_id": "Red Hat JBoss Web Server 2.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    },
    {
      "cve": "CVE-2017-12615",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1493220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution via JSP Upload",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "RHBZ#1493220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12615",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81",
          "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution via JSP Upload"
    },
    {
      "cve": "CVE-2017-12617",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1494283"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution bypass for CVE-2017-12615",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "RHBZ#1494283",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12617",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html",
          "url": "https://tomcat.apache.org/security-7.html"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-8.html",
          "url": "https://tomcat.apache.org/security-8.html"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution bypass for CVE-2017-12615"
    }
  ]
}
  rhsa-2017:3193
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3193",
        "url": "https://access.redhat.com/errata/RHSA-2017:3193"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3193.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:36+00:00",
      "generator": {
        "date": "2025-10-09T17:50:36+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3193",
      "initial_release_date": "2017-11-13T17:35:40+00:00",
      "revision_history": [
        {
          "date": "2017-11-13T17:35:40+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-13T17:35:40+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:36+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
                  "product_id": "7ComputeNode-optional-7.2.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.2::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.2)",
                  "product_id": "7Server-7.2.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
                  "product_id": "7Server-optional-7.2.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.src",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.src",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
                  "product_id": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-40.el7_2.6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.src",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.src",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  rhsa-2017_3240
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 and Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 21st November 2017]\nPreviously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.\n\nThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nThis release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3240",
        "url": "https://access.redhat.com/errata/RHSA-2017:3240"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3229231",
        "url": "https://access.redhat.com/articles/3229231"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1508880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508880"
      },
      {
        "category": "external",
        "summary": "1508884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508884"
      },
      {
        "category": "external",
        "summary": "1508885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508885"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3240.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update",
    "tracking": {
      "current_release_date": "2024-12-22T18:31:33+00:00",
      "generator": {
        "date": "2024-12-22T18:31:33+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.4"
        }
      },
      "id": "RHSA-2017:3240",
      "initial_release_date": "2017-11-16T19:27:22+00:00",
      "revision_history": [
        {
          "date": "2017-11-16T19:27:22+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-21T18:17:26+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-22T18:31:33+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
                  "product_id": "6Server-JBEAP-6.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
                  "product_id": "7Server-JBEAP-6.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Enterprise Application Platform"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.26-58.ep6.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-tools@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.26-58.ep6.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap22@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-tools@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.src",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:27:22+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. The JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:27:22+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. The JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:27:22+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. The JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  rhsa-2017:3114
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Web Server 2.1.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThis release provides an update to httpd, OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2. The updates are documented in the Release Notes document linked to in the References.\n\nThis release of Red Hat JBoss Web Server 2.1.2 Service Pack 2 serves as a update for Red Hat JBoss Web Server 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nUsers of Red Hat JBoss Web Server 2 should upgrade to these updated packages, which resolve several security issues\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12617)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1338640)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1448709)\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1493075)\n\n* The jboss-ews-application-servers zip README contains incomplete description of fixed CVEs (BZ#1497953)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3114",
        "url": "https://access.redhat.com/errata/RHSA-2017:3114"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=2.1.2",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=2.1.2"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3227901",
        "url": "https://access.redhat.com/articles/3227901"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1493075",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493075"
      },
      {
        "category": "external",
        "summary": "1493220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
      },
      {
        "category": "external",
        "summary": "1494283",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
      },
      {
        "category": "external",
        "summary": "1497953",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497953"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3114.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:14+00:00",
      "generator": {
        "date": "2025-10-10T01:58:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3114",
      "initial_release_date": "2017-11-02T19:04:48+00:00",
      "revision_history": [
        {
          "date": "2017-11-02T19:04:48+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-02T19:04:48+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 2.1",
                "product": {
                  "name": "Red Hat JBoss Web Server 2.1",
                  "product_id": "Red Hat JBoss Web Server 2.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    },
    {
      "cve": "CVE-2017-12615",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1493220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution via JSP Upload",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "RHBZ#1493220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12615",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81",
          "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution via JSP Upload"
    },
    {
      "cve": "CVE-2017-12617",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1494283"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution bypass for CVE-2017-12615",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "RHBZ#1494283",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12617",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html",
          "url": "https://tomcat.apache.org/security-7.html"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-8.html",
          "url": "https://tomcat.apache.org/security-8.html"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution bypass for CVE-2017-12615"
    }
  ]
}
  RHSA-2017:3239
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Application Platform.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 21st November 2017]\nPreviously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.\n\nThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nThis release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3239",
        "url": "https://access.redhat.com/errata/RHSA-2017:3239"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/",
        "url": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3229231",
        "url": "https://access.redhat.com/articles/3229231"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1508880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508880"
      },
      {
        "category": "external",
        "summary": "1508884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508884"
      },
      {
        "category": "external",
        "summary": "1508885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508885"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3239.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:15+00:00",
      "generator": {
        "date": "2025-10-10T01:58:15+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3239",
      "initial_release_date": "2017-11-16T19:10:21+00:00",
      "revision_history": [
        {
          "date": "2017-11-16T19:10:21+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-21T18:05:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:15+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 6.4",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 6.4",
                  "product_id": "Red Hat JBoss Enterprise Application Platform 6.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Enterprise Application Platform"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3560",
      "discovery_date": "2009-11-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533174"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "RHBZ#533174",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3560",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560"
        }
      ],
      "release_date": "2009-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2009-3720",
      "discovery_date": "2009-08-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "531697"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "RHBZ#531697",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720"
        }
      ],
      "release_date": "2009-01-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2012-0876",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "discovery_date": "2012-01-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "786617"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: hash table collisions CPU usage DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-0876"
        },
        {
          "category": "external",
          "summary": "RHBZ#786617",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0876",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876"
        }
      ],
      "release_date": "2012-03-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: hash table collisions CPU usage DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  RHSA-2017:2478
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2478",
        "url": "https://access.redhat.com/errata/RHSA-2017:2478"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2478.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:32+00:00",
      "generator": {
        "date": "2025-10-09T17:50:32+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2478",
      "initial_release_date": "2017-08-15T18:11:45+00:00",
      "revision_history": [
        {
          "date": "2017-08-15T18:11:45+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-08-15T18:11:45+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:32+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                  "product_id": "6Client-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
                  "product_id": "6Client-optional-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                  "product_id": "6ComputeNode-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
                  "product_id": "6ComputeNode-optional-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.src",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.src",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
                  "product_id": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-60.el6_9.5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  RHSA-2017:2479
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2479",
        "url": "https://access.redhat.com/errata/RHSA-2017:2479"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2479.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:33+00:00",
      "generator": {
        "date": "2025-10-09T17:50:33+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2479",
      "initial_release_date": "2017-08-15T18:23:44+00:00",
      "revision_history": [
        {
          "date": "2017-08-15T18:23:44+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-08-15T18:23:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:33+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
                  "product_id": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-67.el7_4.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.src",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.src",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  RHSA-2017:3193
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3193",
        "url": "https://access.redhat.com/errata/RHSA-2017:3193"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3193.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:36+00:00",
      "generator": {
        "date": "2025-10-09T17:50:36+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3193",
      "initial_release_date": "2017-11-13T17:35:40+00:00",
      "revision_history": [
        {
          "date": "2017-11-13T17:35:40+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-13T17:35:40+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:36+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
                  "product_id": "7ComputeNode-optional-7.2.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.2::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.2)",
                  "product_id": "7Server-7.2.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
                  "product_id": "7Server-optional-7.2.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.src",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.src",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
                  "product_id": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-40.el7_2.6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.src",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.src",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  rhsa-2017:3113
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Web Server 2.1.2 for RHEL 6 and Red Hat JBoss Enterprise Web Server 2.1.2 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThis release provides an update to httpd, OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2.1.2. The updates are documented in the Release Notes document linked to in the References.\n\nThis release of Red Hat JBoss Web Server 2.1.2 Service Pack 2 serves as a update for Red Hat JBoss Web Server 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nUsers of Red Hat JBoss Web Server 2 should upgrade to these updated packages, which resolve several security issues.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12617)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1338640)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1448709)\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1493075)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3113",
        "url": "https://access.redhat.com/errata/RHSA-2017:3113"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3227901",
        "url": "https://access.redhat.com/articles/3227901"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1493075",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493075"
      },
      {
        "category": "external",
        "summary": "1493220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
      },
      {
        "category": "external",
        "summary": "1494283",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3113.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:14+00:00",
      "generator": {
        "date": "2025-10-10T01:58:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3113",
      "initial_release_date": "2017-11-02T19:15:44+00:00",
      "revision_history": [
        {
          "date": "2017-11-02T19:15:44+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-02T19:15:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
                  "product_id": "6Server-JBEWS-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
                  "product_id": "7Server-JBEWS-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.26-58.ep6.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-tools@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.src",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-maven-devel@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-maven-devel@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-maven-devel@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-maven-devel@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    },
    {
      "cve": "CVE-2017-12615",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1493220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution via JSP Upload",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "RHBZ#1493220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12615",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81",
          "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution via JSP Upload"
    },
    {
      "cve": "CVE-2017-12617",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1494283"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution bypass for CVE-2017-12615",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "RHBZ#1494283",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12617",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html",
          "url": "https://tomcat.apache.org/security-7.html"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-8.html",
          "url": "https://tomcat.apache.org/security-8.html"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution bypass for CVE-2017-12615"
    }
  ]
}
  rhsa-2017:2709
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for JBoss Core Services on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2 serves as an update for Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2709",
        "url": "https://access.redhat.com/errata/RHSA-2017:2709"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
      },
      {
        "category": "external",
        "summary": "1243888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "JBCS-329",
        "url": "https://issues.redhat.com/browse/JBCS-329"
      },
      {
        "category": "external",
        "summary": "JBCS-336",
        "url": "https://issues.redhat.com/browse/JBCS-336"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2709.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services security update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:12+00:00",
      "generator": {
        "date": "2025-10-10T01:58:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2709",
      "initial_release_date": "2017-09-13T16:48:46+00:00",
      "revision_history": [
        {
          "date": "2017-09-13T16:48:46+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-09-13T16:48:46+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                  "product_id": "7Server-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-122.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-122.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-122.jbcs.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-3185",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2015-07-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1243888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "RHBZ#1243888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16",
          "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16"
        }
      ],
      "release_date": "2015-07-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:48:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2709"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:48:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2709"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:48:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2709"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017_3113
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Web Server 2.1.2 for RHEL 6 and Red Hat JBoss Enterprise Web Server 2.1.2 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThis release provides an update to httpd, OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2.1.2. The updates are documented in the Release Notes document linked to in the References.\n\nThis release of Red Hat JBoss Web Server 2.1.2 Service Pack 2 serves as a update for Red Hat JBoss Web Server 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nUsers of Red Hat JBoss Web Server 2 should upgrade to these updated packages, which resolve several security issues.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12617)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1338640)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1448709)\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1493075)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3113",
        "url": "https://access.redhat.com/errata/RHSA-2017:3113"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3227901",
        "url": "https://access.redhat.com/articles/3227901"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1493075",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493075"
      },
      {
        "category": "external",
        "summary": "1493220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
      },
      {
        "category": "external",
        "summary": "1494283",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3113.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update",
    "tracking": {
      "current_release_date": "2024-12-22T18:31:43+00:00",
      "generator": {
        "date": "2024-12-22T18:31:43+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.4"
        }
      },
      "id": "RHSA-2017:3113",
      "initial_release_date": "2017-11-02T19:15:44+00:00",
      "revision_history": [
        {
          "date": "2017-11-02T19:15:44+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-02T19:15:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-22T18:31:43+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
                  "product_id": "6Server-JBEWS-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
                  "product_id": "7Server-JBEWS-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.26-58.ep6.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-tools@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.src",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-maven-devel@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-maven-devel@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-maven-devel@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-maven-devel@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    },
    {
      "cve": "CVE-2017-12615",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1493220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution via JSP Upload",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "RHBZ#1493220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12615",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81",
          "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution via JSP Upload"
    },
    {
      "cve": "CVE-2017-12617",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1494283"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution bypass for CVE-2017-12615",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "RHBZ#1494283",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12617",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html",
          "url": "https://tomcat.apache.org/security-7.html"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-8.html",
          "url": "https://tomcat.apache.org/security-8.html"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution bypass for CVE-2017-12615"
    }
  ]
}
  rhsa-2017_2710
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for JBoss Core Services on Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2 serves as an update for Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2710",
        "url": "https://access.redhat.com/errata/RHSA-2017:2710"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
      },
      {
        "category": "external",
        "summary": "1243888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "JBCS-329",
        "url": "https://issues.redhat.com/browse/JBCS-329"
      },
      {
        "category": "external",
        "summary": "JBCS-337",
        "url": "https://issues.redhat.com/browse/JBCS-337"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2710.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services security update",
    "tracking": {
      "current_release_date": "2024-12-22T18:31:34+00:00",
      "generator": {
        "date": "2024-12-22T18:31:34+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.4"
        }
      },
      "id": "RHSA-2017:2710",
      "initial_release_date": "2017-09-13T16:49:04+00:00",
      "revision_history": [
        {
          "date": "2017-09-13T16:49:04+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-09-13T16:49:04+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-22T18:31:34+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 6 Server",
                  "product_id": "6Server-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-122.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-122.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-122.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-122.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-122.jbcs.el6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-3185",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2015-07-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1243888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "RHBZ#1243888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16",
          "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16"
        }
      ],
      "release_date": "2015-07-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:49:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2710"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:49:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2710"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:49:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2710"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017:2479
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2479",
        "url": "https://access.redhat.com/errata/RHSA-2017:2479"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2479.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:33+00:00",
      "generator": {
        "date": "2025-10-09T17:50:33+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2479",
      "initial_release_date": "2017-08-15T18:23:44+00:00",
      "revision_history": [
        {
          "date": "2017-08-15T18:23:44+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-08-15T18:23:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:33+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
                  "product_id": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-67.el7_4.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.src",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.src",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017:2710
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for JBoss Core Services on Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2 serves as an update for Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2710",
        "url": "https://access.redhat.com/errata/RHSA-2017:2710"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
      },
      {
        "category": "external",
        "summary": "1243888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "JBCS-329",
        "url": "https://issues.redhat.com/browse/JBCS-329"
      },
      {
        "category": "external",
        "summary": "JBCS-337",
        "url": "https://issues.redhat.com/browse/JBCS-337"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2710.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services security update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:13+00:00",
      "generator": {
        "date": "2025-10-10T01:58:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2710",
      "initial_release_date": "2017-09-13T16:49:04+00:00",
      "revision_history": [
        {
          "date": "2017-09-13T16:49:04+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-09-13T16:49:04+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 6 Server",
                  "product_id": "6Server-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-122.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-122.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-122.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-122.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-122.jbcs.el6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-3185",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2015-07-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1243888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "RHBZ#1243888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16",
          "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16"
        }
      ],
      "release_date": "2015-07-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:49:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2710"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:49:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2710"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:49:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2710"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017:3194
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3194",
        "url": "https://access.redhat.com/errata/RHSA-2017:3194"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3194.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:37+00:00",
      "generator": {
        "date": "2025-10-09T17:50:37+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3194",
      "initial_release_date": "2017-11-13T17:36:28+00:00",
      "revision_history": [
        {
          "date": "2017-11-13T17:36:28+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-13T17:36:28+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:37+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
                  "product_id": "7ComputeNode-optional-7.3.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
                  "product_id": "7Server-7.3.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
                  "product_id": "7Server-optional-7.3.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
                  "product_id": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.src",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.src",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.src",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.src",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  RHSA-2017:2708
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Core Services.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2 serves as an update for Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2708",
        "url": "https://access.redhat.com/errata/RHSA-2017:2708"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
      },
      {
        "category": "external",
        "summary": "1243888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "JBCS-329",
        "url": "https://issues.redhat.com/browse/JBCS-329"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2708.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services security update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:12+00:00",
      "generator": {
        "date": "2025-10-10T01:58:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2708",
      "initial_release_date": "2017-09-13T16:37:52+00:00",
      "revision_history": [
        {
          "date": "2017-09-13T16:37:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-09-13T16:37:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Text-Only JBCS",
                "product": {
                  "name": "Text-Only JBCS",
                  "product_id": "Text-Only JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-3185",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2015-07-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1243888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Text-Only JBCS"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "RHBZ#1243888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16",
          "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16"
        }
      ],
      "release_date": "2015-07-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:37:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Text-Only JBCS"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2708"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Text-Only JBCS"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Text-Only JBCS"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:37:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Text-Only JBCS"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2708"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "Text-Only JBCS"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Text-Only JBCS"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Text-Only JBCS"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:37:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Text-Only JBCS"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2708"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "Text-Only JBCS"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Text-Only JBCS"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  RHSA-2017:2483
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request. (CVE-2017-7659)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2483",
        "url": "https://access.redhat.com/errata/RHSA-2017:2483"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463199",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463199"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2483.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd24-httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:35+00:00",
      "generator": {
        "date": "2025-10-09T17:50:35+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2483",
      "initial_release_date": "2017-08-16T23:04:17+00:00",
      "revision_history": [
        {
          "date": "2017-08-16T23:04:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-08-16T23:04:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:35+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
                  "product_id": "6Server-RHSCL-2.4-6.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
                  "product_id": "7Server-RHSCL-2.4-7.3.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Software Collections"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el6.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el6.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
                "product": {
                  "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
                  "product_id": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el7.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
                "product": {
                  "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
                  "product_id": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el6.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el7.1.src",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el7.1.src",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el7.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el6.1.src",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el6.1.src",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el6.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7659",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463199"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_http2 NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7659"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463199",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463199"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7659",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7659"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_http2 NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  RHSA-2017:3195
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3195",
        "url": "https://access.redhat.com/errata/RHSA-2017:3195"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3195.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:38+00:00",
      "generator": {
        "date": "2025-10-09T17:50:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3195",
      "initial_release_date": "2017-11-13T17:35:58+00:00",
      "revision_history": [
        {
          "date": "2017-11-13T17:35:58+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-13T17:35:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
                  "product_id": "6ComputeNode-6.7.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
                  "product_id": "6ComputeNode-optional-6.7.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
                  "product_id": "6Server-6.7.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.src",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.src",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
                  "product_id": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-47.el6_7.5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.src",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.src",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.src",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  RHSA-2017:2710
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for JBoss Core Services on Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2 serves as an update for Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2710",
        "url": "https://access.redhat.com/errata/RHSA-2017:2710"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
      },
      {
        "category": "external",
        "summary": "1243888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "JBCS-329",
        "url": "https://issues.redhat.com/browse/JBCS-329"
      },
      {
        "category": "external",
        "summary": "JBCS-337",
        "url": "https://issues.redhat.com/browse/JBCS-337"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2710.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services security update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:13+00:00",
      "generator": {
        "date": "2025-10-10T01:58:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2710",
      "initial_release_date": "2017-09-13T16:49:04+00:00",
      "revision_history": [
        {
          "date": "2017-09-13T16:49:04+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-09-13T16:49:04+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 6 Server",
                  "product_id": "6Server-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-122.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-122.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-122.jbcs.el6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-122.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-122.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-122.jbcs.el6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-122.jbcs.el6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server",
          "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBCS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-3185",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2015-07-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1243888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "RHBZ#1243888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16",
          "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16"
        }
      ],
      "release_date": "2015-07-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:49:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2710"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:49:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2710"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:49:04+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2710"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el6.noarch",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017_3239
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Application Platform.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 21st November 2017]\nPreviously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.\n\nThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nThis release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3239",
        "url": "https://access.redhat.com/errata/RHSA-2017:3239"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/",
        "url": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3229231",
        "url": "https://access.redhat.com/articles/3229231"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1508880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508880"
      },
      {
        "category": "external",
        "summary": "1508884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508884"
      },
      {
        "category": "external",
        "summary": "1508885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508885"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3239.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update",
    "tracking": {
      "current_release_date": "2024-12-22T18:31:37+00:00",
      "generator": {
        "date": "2024-12-22T18:31:37+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.4"
        }
      },
      "id": "RHSA-2017:3239",
      "initial_release_date": "2017-11-16T19:10:21+00:00",
      "revision_history": [
        {
          "date": "2017-11-16T19:10:21+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-21T18:05:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-22T18:31:37+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 6.4",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 6.4",
                  "product_id": "Red Hat JBoss Enterprise Application Platform 6.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Enterprise Application Platform"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3560",
      "discovery_date": "2009-11-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533174"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "RHBZ#533174",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3560",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560"
        }
      ],
      "release_date": "2009-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2009-3720",
      "discovery_date": "2009-08-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "531697"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "RHBZ#531697",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720"
        }
      ],
      "release_date": "2009-01-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2012-0876",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "discovery_date": "2012-01-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "786617"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: hash table collisions CPU usage DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-0876"
        },
        {
          "category": "external",
          "summary": "RHBZ#786617",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0876",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876"
        }
      ],
      "release_date": "2012-03-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: hash table collisions CPU usage DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  rhsa-2017_3194
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3194",
        "url": "https://access.redhat.com/errata/RHSA-2017:3194"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3194.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-01-05T18:56:03+00:00",
      "generator": {
        "date": "2025-01-05T18:56:03+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.5"
        }
      },
      "id": "RHSA-2017:3194",
      "initial_release_date": "2017-11-13T17:36:28+00:00",
      "revision_history": [
        {
          "date": "2017-11-13T17:36:28+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-13T17:36:28+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-01-05T18:56:03+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
                  "product_id": "7ComputeNode-optional-7.3.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
                  "product_id": "7Server-7.3.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
                  "product_id": "7Server-optional-7.3.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
                  "product_id": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.src",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.src",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.src",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.src",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  RHSA-2017:3113
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Web Server 2.1.2 for RHEL 6 and Red Hat JBoss Enterprise Web Server 2.1.2 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThis release provides an update to httpd, OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2.1.2. The updates are documented in the Release Notes document linked to in the References.\n\nThis release of Red Hat JBoss Web Server 2.1.2 Service Pack 2 serves as a update for Red Hat JBoss Web Server 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nUsers of Red Hat JBoss Web Server 2 should upgrade to these updated packages, which resolve several security issues.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12617)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1338640)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1448709)\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1493075)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3113",
        "url": "https://access.redhat.com/errata/RHSA-2017:3113"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3227901",
        "url": "https://access.redhat.com/articles/3227901"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1493075",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493075"
      },
      {
        "category": "external",
        "summary": "1493220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
      },
      {
        "category": "external",
        "summary": "1494283",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3113.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:14+00:00",
      "generator": {
        "date": "2025-10-10T01:58:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3113",
      "initial_release_date": "2017-11-02T19:15:44+00:00",
      "revision_history": [
        {
          "date": "2017-11-02T19:15:44+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-02T19:15:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
                  "product_id": "6Server-JBEWS-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
                  "product_id": "7Server-JBEWS-2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.26-58.ep6.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-tools@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.src",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-maven-devel@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_id": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.41-19_patch_04.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-maven-devel@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
                "product": {
                  "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_id": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.54-28_patch_05.ep6.el6?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-maven-devel@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
                "product": {
                  "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_id": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.41-19_patch_04.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-javadoc@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-lib@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-docs-webapp@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-webapps@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-admin-webapps@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-jsp-2.2-api@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-log4j@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-el-2.2-api@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-servlet-3.0-api@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
                "product": {
                  "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_id": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tomcat7-maven-devel@7.0.54-28_patch_05.ep6.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 6 Server",
          "product_id": "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch"
        },
        "product_reference": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
        "relates_to_product_reference": "6Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src"
        },
        "product_reference": "tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch"
        },
        "product_reference": "tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src"
        },
        "product_reference": "tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Web Server 2 for RHEL 7 Server",
          "product_id": "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        },
        "product_reference": "tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
        "relates_to_product_reference": "7Server-JBEWS-2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    },
    {
      "cve": "CVE-2017-12615",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1493220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution via JSP Upload",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "RHBZ#1493220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12615",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81",
          "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution via JSP Upload"
    },
    {
      "cve": "CVE-2017-12617",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1494283"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution bypass for CVE-2017-12615",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
          "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
          "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
          "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
          "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
          "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "RHBZ#1494283",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12617",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html",
          "url": "https://tomcat.apache.org/security-7.html"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-8.html",
          "url": "https://tomcat.apache.org/security-8.html"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:15:44+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. After installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3113"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEWS-2:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEWS-2:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el6.src",
            "6Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el6.src",
            "6Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "6Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el6.noarch",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEWS-2:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEWS-2:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-0:6.0.41-19_patch_04.ep6.el7.src",
            "7Server-JBEWS-2:tomcat6-admin-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-docs-webapp-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-el-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-javadoc-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-jsp-2.1-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-lib-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-log4j-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-maven-devel-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-servlet-2.5-api-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat6-webapps-0:6.0.41-19_patch_04.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-0:7.0.54-28_patch_05.ep6.el7.src",
            "7Server-JBEWS-2:tomcat7-admin-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-docs-webapp-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-el-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-javadoc-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-jsp-2.2-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-lib-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-log4j-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-maven-devel-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-servlet-3.0-api-0:7.0.54-28_patch_05.ep6.el7.noarch",
            "7Server-JBEWS-2:tomcat7-webapps-0:7.0.54-28_patch_05.ep6.el7.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution bypass for CVE-2017-12615"
    }
  ]
}
  RHSA-2017:3114
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Web Server 2.1.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThis release provides an update to httpd, OpenSSL and Tomcat 6/7 for Red Hat JBoss Web Server 2. The updates are documented in the Release Notes document linked to in the References.\n\nThis release of Red Hat JBoss Web Server 2.1.2 Service Pack 2 serves as a update for Red Hat JBoss Web Server 2, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nUsers of Red Hat JBoss Web Server 2 should upgrade to these updated packages, which resolve several security issues\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12617)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1338640)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1448709)\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1493075)\n\n* The jboss-ews-application-servers zip README contains incomplete description of fixed CVEs (BZ#1497953)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3114",
        "url": "https://access.redhat.com/errata/RHSA-2017:3114"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=2.1.2",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=2.1.2"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3227901",
        "url": "https://access.redhat.com/articles/3227901"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1493075",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493075"
      },
      {
        "category": "external",
        "summary": "1493220",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
      },
      {
        "category": "external",
        "summary": "1494283",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
      },
      {
        "category": "external",
        "summary": "1497953",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1497953"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3114.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Web Server security and bug fix update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:14+00:00",
      "generator": {
        "date": "2025-10-10T01:58:14+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3114",
      "initial_release_date": "2017-11-02T19:04:48+00:00",
      "revision_history": [
        {
          "date": "2017-11-02T19:04:48+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-02T19:04:48+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:14+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Web Server 2.1",
                "product": {
                  "name": "Red Hat JBoss Web Server 2.1",
                  "product_id": "Red Hat JBoss Web Server 2.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:2.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Web Server"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    },
    {
      "cve": "CVE-2017-12615",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1493220"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution via JSP Upload",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "RHBZ#1493220",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493220"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12615",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12615"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81",
          "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.81"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-19T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution via JSP Upload"
    },
    {
      "cve": "CVE-2017-12617",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2017-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1494283"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "tomcat: Remote Code Execution bypass for CVE-2017-12615",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This flaw affects Tomcat on Red Hat Enterprise Linux only when a specific context is configured with readonly=false. The default configuration has a readonly context, so it is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Web Server 2.1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "RHBZ#1494283",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1494283"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12617",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12617"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-7.html",
          "url": "https://tomcat.apache.org/security-7.html"
        },
        {
          "category": "external",
          "summary": "https://tomcat.apache.org/security-8.html",
          "url": "https://tomcat.apache.org/security-8.html"
        },
        {
          "category": "external",
          "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
          "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        }
      ],
      "release_date": "2017-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-02T19:04:48+00:00",
          "details": "Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3114"
        },
        {
          "category": "workaround",
          "details": "Ensure that readonly is set to true (the default) for the DefaultServlet, WebDAV servlet or application context.\n\nBlock HTTP methods that permit resource modification for untrusted users.",
          "product_ids": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Web Server 2.1"
          ]
        }
      ],
      "threats": [
        {
          "category": "exploit_status",
          "date": "2022-03-25T00:00:00+00:00",
          "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
        },
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "tomcat: Remote Code Execution bypass for CVE-2017-12615"
    }
  ]
}
  rhsa-2017_3195
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3195",
        "url": "https://access.redhat.com/errata/RHSA-2017:3195"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3195.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-01-05T18:56:10+00:00",
      "generator": {
        "date": "2025-01-05T18:56:10+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.5"
        }
      },
      "id": "RHSA-2017:3195",
      "initial_release_date": "2017-11-13T17:35:58+00:00",
      "revision_history": [
        {
          "date": "2017-11-13T17:35:58+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-13T17:35:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-01-05T18:56:10+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
                  "product_id": "6ComputeNode-6.7.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
                  "product_id": "6ComputeNode-optional-6.7.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
                  "product_id": "6Server-6.7.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.src",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.src",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
                  "product_id": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-47.el6_7.5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.src",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.src",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.src",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  rhsa-2017:3239
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Application Platform.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 21st November 2017]\nPreviously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.\n\nThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nThis release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3239",
        "url": "https://access.redhat.com/errata/RHSA-2017:3239"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/",
        "url": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3229231",
        "url": "https://access.redhat.com/articles/3229231"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1508880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508880"
      },
      {
        "category": "external",
        "summary": "1508884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508884"
      },
      {
        "category": "external",
        "summary": "1508885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508885"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3239.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:15+00:00",
      "generator": {
        "date": "2025-10-10T01:58:15+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3239",
      "initial_release_date": "2017-11-16T19:10:21+00:00",
      "revision_history": [
        {
          "date": "2017-11-16T19:10:21+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-21T18:05:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:15+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 6.4",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 6.4",
                  "product_id": "Red Hat JBoss Enterprise Application Platform 6.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.4"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Enterprise Application Platform"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2009-3560",
      "discovery_date": "2009-11-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "533174"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "RHBZ#533174",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533174"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3560",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3560"
        }
      ],
      "release_date": "2009-12-02T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash in big2_toUtf8() on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2009-3720",
      "discovery_date": "2009-08-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "531697"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "RHBZ#531697",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=531697"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3720"
        }
      ],
      "release_date": "2009-01-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: buffer over-read and crash on XML with malformed UTF-8 sequences"
    },
    {
      "cve": "CVE-2012-0876",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "discovery_date": "2012-01-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "786617"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A denial of service flaw was found in the implementation of hash arrays in Expat. An attacker could use this flaw to make an application using Expat consume an excessive amount of CPU time by providing a specially crafted XML file that triggers multiple hash function collisions. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "expat: hash table collisions CPU usage DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-0876"
        },
        {
          "category": "external",
          "summary": "RHBZ#786617",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=786617"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0876",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-0876"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0876"
        }
      ],
      "release_date": "2012-03-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "expat: hash table collisions CPU usage DoS"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Enterprise Application Platform 6.4"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:10:21+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).\n\nThe JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3239"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Enterprise Application Platform 6.4"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  rhsa-2017:3195
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3195",
        "url": "https://access.redhat.com/errata/RHSA-2017:3195"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3195.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:38+00:00",
      "generator": {
        "date": "2025-10-09T17:50:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3195",
      "initial_release_date": "2017-11-13T17:35:58+00:00",
      "revision_history": [
        {
          "date": "2017-11-13T17:35:58+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-13T17:35:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
                  "product_id": "6ComputeNode-6.7.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
                  "product_id": "6ComputeNode-optional-6.7.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
                  "product_id": "6Server-6.7.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.src",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.src",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
                  "product_id": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-47.el6_7.5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-47.el6_7.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
                  "product_id": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-47.el6_7.5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
                "product": {
                  "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
                  "product_id": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-47.el6_7.5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.src",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
          "product_id": "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.src",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
          "product_id": "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.src",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-47.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-47.el6_7.5.noarch",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.i686",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.s390x",
        "relates_to_product_reference": "6Server-6.7.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
        "relates_to_product_reference": "6Server-6.7.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
          "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
          "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3195"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6ComputeNode-optional-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6ComputeNode-optional-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.src",
            "6Server-6.7.EUS:httpd-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-debuginfo-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-devel-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:httpd-manual-0:2.2.15-47.el6_7.5.noarch",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:httpd-tools-0:2.2.15-47.el6_7.5.x86_64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.i686",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.ppc64",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.s390x",
            "6Server-6.7.EUS:mod_ssl-1:2.2.15-47.el6_7.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  rhsa-2017:2478
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2478",
        "url": "https://access.redhat.com/errata/RHSA-2017:2478"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2478.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:32+00:00",
      "generator": {
        "date": "2025-10-09T17:50:32+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2478",
      "initial_release_date": "2017-08-15T18:11:45+00:00",
      "revision_history": [
        {
          "date": "2017-08-15T18:11:45+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-08-15T18:11:45+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:32+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                  "product_id": "6Client-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
                  "product_id": "6Client-optional-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                  "product_id": "6ComputeNode-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
                  "product_id": "6ComputeNode-optional-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.src",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.src",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
                  "product_id": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-60.el6_9.5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  RHSA-2017:2709
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for JBoss Core Services on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2 serves as an update for Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2709",
        "url": "https://access.redhat.com/errata/RHSA-2017:2709"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
      },
      {
        "category": "external",
        "summary": "1243888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "JBCS-329",
        "url": "https://issues.redhat.com/browse/JBCS-329"
      },
      {
        "category": "external",
        "summary": "JBCS-336",
        "url": "https://issues.redhat.com/browse/JBCS-336"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2709.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services security update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:12+00:00",
      "generator": {
        "date": "2025-10-10T01:58:12+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2709",
      "initial_release_date": "2017-09-13T16:48:46+00:00",
      "revision_history": [
        {
          "date": "2017-09-13T16:48:46+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-09-13T16:48:46+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:12+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                  "product_id": "7Server-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-122.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-122.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-122.jbcs.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-3185",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2015-07-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1243888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "RHBZ#1243888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16",
          "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16"
        }
      ],
      "release_date": "2015-07-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:48:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2709"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:48:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2709"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:48:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2709"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017:2483
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request. (CVE-2017-7659)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2483",
        "url": "https://access.redhat.com/errata/RHSA-2017:2483"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463199",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463199"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2483.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd24-httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:35+00:00",
      "generator": {
        "date": "2025-10-09T17:50:35+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:2483",
      "initial_release_date": "2017-08-16T23:04:17+00:00",
      "revision_history": [
        {
          "date": "2017-08-16T23:04:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-08-16T23:04:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:35+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
                  "product_id": "6Server-RHSCL-2.4-6.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
                  "product_id": "7Server-RHSCL-2.4-7.3.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Software Collections"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el6.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el6.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
                "product": {
                  "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
                  "product_id": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el7.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
                "product": {
                  "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
                  "product_id": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el6.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el7.1.src",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el7.1.src",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el7.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el6.1.src",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el6.1.src",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el6.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7659",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463199"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_http2 NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7659"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463199",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463199"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7659",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7659"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_http2 NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017_2709
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for JBoss Core Services on Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2 serves as an update for Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2709",
        "url": "https://access.redhat.com/errata/RHSA-2017:2709"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
      },
      {
        "category": "external",
        "summary": "1243888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "JBCS-329",
        "url": "https://issues.redhat.com/browse/JBCS-329"
      },
      {
        "category": "external",
        "summary": "JBCS-336",
        "url": "https://issues.redhat.com/browse/JBCS-336"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2709.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services security update",
    "tracking": {
      "current_release_date": "2024-12-22T18:31:38+00:00",
      "generator": {
        "date": "2024-12-22T18:31:38+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.4"
        }
      },
      "id": "RHSA-2017:2709",
      "initial_release_date": "2017-09-13T16:48:46+00:00",
      "revision_history": [
        {
          "date": "2017-09-13T16:48:46+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-09-13T16:48:46+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-22T18:31:38+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Core Services on RHEL 7 Server",
                  "product_id": "7Server-JBCS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-libs@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.23-122.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.23-122.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.23-122.jbcs.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.23-122.jbcs.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
                "product": {
                  "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
                  "product_id": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.23-122.jbcs.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch"
        },
        "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server",
          "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBCS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-3185",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2015-07-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1243888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "RHBZ#1243888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16",
          "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16"
        }
      ],
      "release_date": "2015-07-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:48:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2709"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:48:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2709"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
          "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:48:46+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2709"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-libs-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.23-122.jbcs.el7.noarch",
            "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.23-122.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017_2478
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2478",
        "url": "https://access.redhat.com/errata/RHSA-2017:2478"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2478.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-01-05T18:55:52+00:00",
      "generator": {
        "date": "2025-01-05T18:55:52+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.5"
        }
      },
      "id": "RHSA-2017:2478",
      "initial_release_date": "2017-08-15T18:11:45+00:00",
      "revision_history": [
        {
          "date": "2017-08-15T18:11:45+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-08-15T18:11:45+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-01-05T18:55:52+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                  "product_id": "6Client-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
                  "product_id": "6Client-optional-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                  "product_id": "6ComputeNode-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
                  "product_id": "6ComputeNode-optional-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-6.9.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.src",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.src",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
                "product": {
                  "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
                  "product_id": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-60.el6_9.5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.s390x",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.s390x",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=s390"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=s390"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-60.el6_9.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.15-60.el6_9.5.ppc64",
                "product": {
                  "name": "httpd-0:2.2.15-60.el6_9.5.ppc64",
                  "product_id": "httpd-0:2.2.15-60.el6_9.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.15-60.el6_9.5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
                "product": {
                  "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
                  "product_id": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-60.el6_9.5?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
                  "product_id": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-60.el6_9.5?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
          "product_id": "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Client-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
          "product_id": "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6ComputeNode-optional-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Server-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.src",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.15-60.el6_9.5.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.2.15-60.el6_9.5.noarch",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.i686",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.s390x",
        "relates_to_product_reference": "6Workstation-6.9.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
        "relates_to_product_reference": "6Workstation-6.9.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
          "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
          "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:11:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2478"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Client-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Client-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6ComputeNode-optional-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6ComputeNode-optional-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Server-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Server-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.src",
            "6Workstation-6.9.z:httpd-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-debuginfo-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-devel-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:httpd-manual-0:2.2.15-60.el6_9.5.noarch",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:httpd-tools-0:2.2.15-60.el6_9.5.x86_64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.i686",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.ppc64",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.s390x",
            "6Workstation-6.9.z:mod_ssl-1:2.2.15-60.el6_9.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017:3240
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 and Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 21st November 2017]\nPreviously, this erratum was marked as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives. This was incorrect; the erratum is an update, not a replacement. The erratum text has been modified to reflect this.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server.\n\nThis release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.\n\nThe httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.\n\nThis release of JBoss Enterprise Application Platform 6.4.18 Natives serves as an update to the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 Natives are advised to upgrade to these updated packages.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183 and Hanno B\u00f6ck for reporting CVE-2017-9798. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.\n\nBug Fix(es):\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)\n\n* mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)\n\n* Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3240",
        "url": "https://access.redhat.com/errata/RHSA-2017:3240"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/articles/3229231",
        "url": "https://access.redhat.com/articles/3229231"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "external",
        "summary": "1508880",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508880"
      },
      {
        "category": "external",
        "summary": "1508884",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508884"
      },
      {
        "category": "external",
        "summary": "1508885",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1508885"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3240.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.18 security update",
    "tracking": {
      "current_release_date": "2025-10-10T01:58:16+00:00",
      "generator": {
        "date": "2025-10-10T01:58:16+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3240",
      "initial_release_date": "2017-11-16T19:27:22+00:00",
      "revision_history": [
        {
          "date": "2017-11-16T19:27:22+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-21T18:17:26+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-10T01:58:16+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
                  "product_id": "6Server-JBEAP-6.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
                  "product_id": "7Server-JBEAP-6.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Enterprise Application Platform"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.26-58.ep6.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-tools@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                "product": {
                  "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_id": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.26-58.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl22@2.2.26-58.ep6.el7?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-manual@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap22@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-tools@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
                "product": {
                  "name": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
                  "product_id": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22-devel@2.2.26-58.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el7?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                "product": {
                  "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2h-14.jbcs.el6?arch=i686\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el6?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.src",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                "product": {
                  "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_id": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2h-14.jbcs.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                "product": {
                  "name": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_id": "httpd22-0:2.2.26-58.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd22@2.2.26-58.ep6.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native-debuginfo@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                "product": {
                  "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_id": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_cluster-native@1.2.13-9.Final_redhat_2.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_id": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.2.26-57.ep6.el6?arch=i386\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                "product": {
                  "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_id": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.2.26-57.ep6.el6?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.i386 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.i386",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server",
          "product_id": "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
        "relates_to_product_reference": "6Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64"
        },
        "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64"
        },
        "product_reference": "mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64"
        },
        "product_reference": "mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server",
          "product_id": "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        },
        "product_reference": "mod_ssl22-1:2.2.26-58.ep6.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-6.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:27:22+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. The JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:27:22+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. The JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
          "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
          "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
          "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
          "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
          "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
          "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
          "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
          "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-16T19:27:22+00:00",
          "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically. For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. The JBoss server process must be restarted for the update to take effect.",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3240"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.src",
            "6Server-JBEAP-6.4:httpd-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-debuginfo-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-devel-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-manual-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:httpd-tools-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.src",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.i686",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.ppc64",
            "6Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.src",
            "6Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ldap-0:2.2.26-57.ep6.el6.x86_64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.i386",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.ppc64",
            "6Server-JBEAP-6.4:mod_ssl-1:2.2.26-57.ep6.el6.x86_64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.src",
            "7Server-JBEAP-6.4:httpd22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-debuginfo-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-devel-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-manual-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:httpd22-tools-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.src",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-debuginfo-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-devel-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-libs-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-perl-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.ppc64",
            "7Server-JBEAP-6.4:jbcs-httpd24-openssl-static-1:1.0.2h-14.jbcs.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.src",
            "7Server-JBEAP-6.4:mod_cluster-native-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_cluster-native-debuginfo-0:1.2.13-9.Final_redhat_2.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ldap22-0:2.2.26-58.ep6.el7.x86_64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.ppc64",
            "7Server-JBEAP-6.4:mod_ssl22-1:2.2.26-58.ep6.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  rhsa-2017_2708
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update is now available for Red Hat JBoss Core Services.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 2 serves as an update for Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1, and includes bug fixes, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied. (CVE-2015-3185)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183)\n\nRed Hat would like to thank OpenVPN for reporting CVE-2016-2183. Upstream acknowledges Karthikeyan Bhargavan (Inria) and Ga\u00ebtan Leurent (Inria) as the original reporters of CVE-2016-2183.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2708",
        "url": "https://access.redhat.com/errata/RHSA-2017:2708"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23",
        "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.apachehttp\u0026downloadType=securityPatches\u0026version=2.4.23"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/",
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
      },
      {
        "category": "external",
        "summary": "1243888",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
      },
      {
        "category": "external",
        "summary": "1369383",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "JBCS-329",
        "url": "https://issues.redhat.com/browse/JBCS-329"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2708.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Core Services security update",
    "tracking": {
      "current_release_date": "2024-12-22T18:31:47+00:00",
      "generator": {
        "date": "2024-12-22T18:31:47+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.4"
        }
      },
      "id": "RHSA-2017:2708",
      "initial_release_date": "2017-09-13T16:37:52+00:00",
      "revision_history": [
        {
          "date": "2017-09-13T16:37:52+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-09-13T16:37:52+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-12-22T18:31:47+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Core Services 1",
                "product": {
                  "name": "Red Hat JBoss Core Services 1",
                  "product_id": "Red Hat JBoss Core Services 1",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_core_services:1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Core Services"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-3185",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2015-07-16T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1243888"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that in httpd 2.4, the internal API function ap_some_auth_required() could incorrectly indicate that a request was authenticated even when no authentication was used. An httpd module using this API function could consequently allow access that should have been denied.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Core Services 1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "RHBZ#1243888",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243888"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3185",
          "url": "https://www.cve.org/CVERecord?id=CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3185"
        },
        {
          "category": "external",
          "summary": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16",
          "url": "http://httpd.apache.org/security/vulnerabilities_24.html#2.4.16"
        }
      ],
      "release_date": "2015-07-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:37:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Red Hat JBoss Core Services 1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2708"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Core Services 1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_some_auth_required() does not properly indicate authenticated request in 2.4"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "OpenVPN"
          ]
        },
        {
          "names": [
            "Karthikeyan Bhargavan",
            "Ga\u00ebtan Leurent"
          ],
          "organization": "Inria",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2016-2183",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "discovery_date": "2016-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1369383"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "OpenSSL security update RHSA-2016:1940 mitigates this issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default.\n\nNSS addressed this issue by implementing limits on the amount of plain text which can be encrypted by using the same key. Once the limit is reached, the keys will need to be re-negotiated manually. This change will be available in nss-3.27.\n\nGnuTLS is not affected by this issue, since it prioritizes AES before 3DES in the cipher list.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Core Services 1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "RHBZ#1369383",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369383"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2183",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2183"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/articles/2548661",
          "url": "https://access.redhat.com/articles/2548661"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2016:1940",
          "url": "https://access.redhat.com/errata/RHSA-2016:1940"
        },
        {
          "category": "external",
          "summary": "https://sweet32.info/",
          "url": "https://sweet32.info/"
        }
      ],
      "release_date": "2016-08-24T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:37:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Red Hat JBoss Core Services 1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2708"
        },
        {
          "category": "workaround",
          "details": "1.SSL/TLS configurations should prefer AES over DES. Versions of OpenSSL shipped with Red Hat Enterprise Linux 6 and 7 already do so. In the version of OpenSSL shipped with Red Hat Enterprise Linux 5, 3DES is listed below the AES-256 cipher and above the AES-128 cipher, therefore AES-256 based ciphersuite should not be disabled on the server.\n2. Servers using OpenSSL, should not disable AES-128 and AES-256 ciphersuites. Versions of Apache shipped with Red Hat Enterprise Linux use the default cipher string, in which AES is preferred over DES/3DES based ciphersuites.\n\nFor JBoss Middleware, and Java mitigations, please review this knowledge base article:\n\nhttps://access.redhat.com/articles/2598471\n\nThis can be mitigated on OpenShift Container Platform (OCP) by disabling the vulnerable TLS cipher suite in the applicable component. TLS configuration options for OCP are described here:\n\nhttps://access.redhat.com/articles/5348961",
          "product_ids": [
            "Red Hat JBoss Core Services 1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Core Services 1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "SSL/TLS: Birthday attack against 64-bit block ciphers (SWEET32)"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Red Hat JBoss Core Services 1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-09-13T16:37:52+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "Red Hat JBoss Core Services 1"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2708"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "Red Hat JBoss Core Services 1"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "Red Hat JBoss Core Services 1"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017_2479
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2479",
        "url": "https://access.redhat.com/errata/RHSA-2017:2479"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2479.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-01-05T18:55:40+00:00",
      "generator": {
        "date": "2025-01-05T18:55:40+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.5"
        }
      },
      "id": "RHSA-2017:2479",
      "initial_release_date": "2017-08-15T18:23:44+00:00",
      "revision_history": [
        {
          "date": "2017-08-15T18:23:44+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-08-15T18:23:44+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-01-05T18:55:40+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.4.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
                  "product_id": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-67.el7_4.2?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.src",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.src",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-67.el7_4.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
                  "product_id": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-67.el7_4.2?arch=aarch64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
                  "product_id": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-67.el7_4.2?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
                  "product_id": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-67.el7_4.2?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Client-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Server-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.src",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-67.el7_4.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-67.el7_4.2.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.4.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
          "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
          "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-15T18:23:44+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2479"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Client-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Client-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7ComputeNode-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7ComputeNode-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Server-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Server-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.src",
            "7Workstation-optional-7.4.Z:httpd-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-debuginfo-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-devel-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:httpd-manual-0:2.4.6-67.el7_4.2.noarch",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:httpd-tools-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ldap-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.aarch64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_proxy_html-1:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_session-0:2.4.6-67.el7_4.2.x86_64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.ppc64le",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.s390x",
            "7Workstation-optional-7.4.Z:mod_ssl-1:2.4.6-67.el7_4.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017_2483
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd24-httpd is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request. (CVE-2017-7659)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:2483",
        "url": "https://access.redhat.com/errata/RHSA-2017:2483"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463199",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463199"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_2483.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd24-httpd security update",
    "tracking": {
      "current_release_date": "2025-01-05T18:55:47+00:00",
      "generator": {
        "date": "2025-01-05T18:55:47+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.5"
        }
      },
      "id": "RHSA-2017:2483",
      "initial_release_date": "2017-08-16T23:04:17+00:00",
      "revision_history": [
        {
          "date": "2017-08-16T23:04:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-08-16T23:04:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-01-05T18:55:47+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-RHSCL-2.4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
                  "product_id": "6Server-RHSCL-2.4-6.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
                  "product_id": "7Server-RHSCL-2.4-7.3.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Software Collections"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el7.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
                  "product_id": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el7.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ssl@2.4.25-9.el6.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_session@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_ldap@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-devel@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-tools@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-mod_proxy_html@2.4.25-9.el6.1?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
                "product": {
                  "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
                  "product_id": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-debuginfo@2.4.25-9.el6.1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
                "product": {
                  "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
                  "product_id": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el7.1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
                "product": {
                  "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
                  "product_id": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd-manual@2.4.25-9.el6.1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el7.1.src",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el7.1.src",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el7.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el7.1?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd24-httpd-0:2.4.25-9.el6.1.src",
                "product": {
                  "name": "httpd24-httpd-0:2.4.25-9.el6.1.src",
                  "product_id": "httpd24-httpd-0:2.4.25-9.el6.1.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd24-httpd@2.4.25-9.el6.1?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.src",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4-7.3.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.src",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch"
        },
        "product_reference": "httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        },
        "product_reference": "httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.4"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7659",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463199"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the mod_http2 module of httpd. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP/2 request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_http2 NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7659"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463199",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463199"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7659",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7659"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7659"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_http2 NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
          "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
          "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
          "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
          "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
          "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
          "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-08-16T23:04:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:2483"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4-6.7.Z:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.src",
            "6Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el6.1.noarch",
            "6Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el6.1.x86_64",
            "6Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el6.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4-7.3.Z:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Server-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Server-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Server-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.src",
            "7Workstation-RHSCL-2.4:httpd24-httpd-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-debuginfo-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-devel-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-httpd-manual-0:2.4.25-9.el7.1.noarch",
            "7Workstation-RHSCL-2.4:httpd24-httpd-tools-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ldap-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_proxy_html-1:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_session-0:2.4.25-9.el7.1.x86_64",
            "7Workstation-RHSCL-2.4:httpd24-mod_ssl-1:2.4.25-9.el7.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    }
  ]
}
  rhsa-2017_3193
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3193",
        "url": "https://access.redhat.com/errata/RHSA-2017:3193"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3193.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-01-05T18:55:57+00:00",
      "generator": {
        "date": "2025-01-05T18:55:57+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.5"
        }
      },
      "id": "RHSA-2017:3193",
      "initial_release_date": "2017-11-13T17:35:40+00:00",
      "revision_history": [
        {
          "date": "2017-11-13T17:35:40+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-13T17:35:40+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-01-05T18:55:57+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
                  "product_id": "7ComputeNode-optional-7.2.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.2::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.2)",
                  "product_id": "7Server-7.2.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.2::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
                  "product_id": "7Server-optional-7.2.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.2::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.x86_64",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.s390x",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.ppc64",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-40.el7_2.6?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-40.el7_2.6?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-40.el7_2.6.src",
                "product": {
                  "name": "httpd-0:2.4.6-40.el7_2.6.src",
                  "product_id": "httpd-0:2.4.6-40.el7_2.6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-40.el7_2.6?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
                  "product_id": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-40.el7_2.6?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
          "product_id": "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.src",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.src",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-40.el7_2.6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-40.el7_2.6.noarch",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.s390x",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
          "product_id": "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
        "relates_to_product_reference": "7Server-optional-7.2.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
          "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
          "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:35:40+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3193"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7ComputeNode-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7ComputeNode-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.src",
            "7Server-optional-7.2.EUS:httpd-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-debuginfo-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-devel-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:httpd-manual-0:2.4.6-40.el7_2.6.noarch",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:httpd-tools-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ldap-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_proxy_html-1:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_session-0:2.4.6-40.el7_2.6.x86_64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.ppc64le",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.s390x",
            "7Server-optional-7.2.EUS:mod_ssl-1:2.4.6-40.el7_2.6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  RHSA-2017:3194
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for httpd is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.\n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno B\u00f6ck for reporting CVE-2017-9798.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2017:3194",
        "url": "https://access.redhat.com/errata/RHSA-2017:3194"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "1463194",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
      },
      {
        "category": "external",
        "summary": "1463197",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
      },
      {
        "category": "external",
        "summary": "1463205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
      },
      {
        "category": "external",
        "summary": "1463207",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
      },
      {
        "category": "external",
        "summary": "1470748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "category": "external",
        "summary": "1490344",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_3194.json"
      }
    ],
    "title": "Red Hat Security Advisory: httpd security update",
    "tracking": {
      "current_release_date": "2025-10-09T17:50:37+00:00",
      "generator": {
        "date": "2025-10-09T17:50:37+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2017:3194",
      "initial_release_date": "2017-11-13T17:36:28+00:00",
      "revision_history": [
        {
          "date": "2017-11-13T17:36:28+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2017-11-13T17:36:28+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T17:50:37+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
                  "product_id": "7ComputeNode-optional-7.3.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)",
                  "product_id": "7Server-7.3.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
                  "product_id": "7Server-optional-7.3.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus:7.3::server"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=s390x\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=ppc64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-debuginfo@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ldap@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_proxy_html@2.4.6-45.el7_3.5?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_session@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/mod_ssl@2.4.6-45.el7_3.5?arch=ppc64le\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-tools@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
                "product": {
                  "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_id": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-devel@2.4.6-45.el7_3.5?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
                "product": {
                  "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
                  "product_id": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd-manual@2.4.6-45.el7_3.5?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "httpd-0:2.4.6-45.el7_3.5.src",
                "product": {
                  "name": "httpd-0:2.4.6-45.el7_3.5.src",
                  "product_id": "httpd-0:2.4.6-45.el7_3.5.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/httpd@2.4.6-45.el7_3.5?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)",
          "product_id": "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.src",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)",
          "product_id": "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.src",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-manual-0:2.4.6-45.el7_3.5.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch"
        },
        "product_reference": "httpd-manual-0:2.4.6-45.el7_3.5.noarch",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_session-0:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_session-0:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.s390x",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)",
          "product_id": "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        },
        "product_reference": "mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
        "relates_to_product_reference": "7Server-optional-7.3.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "cwe": {
        "id": "CWE-287",
        "name": "Improper Authentication"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463194"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_get_basic_auth_pw() authentication bypass",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463194",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463194"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3167",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_get_basic_auth_pw() authentication bypass"
    },
    {
      "cve": "CVE-2017-3169",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463197"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_ssl NULL pointer dereference",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463197",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463197"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3169",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_ssl NULL pointer dereference"
    },
    {
      "cve": "CVE-2017-7668",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463205"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: ap_find_token() buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463205",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463205"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7668",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7668"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: ap_find_token() buffer overread"
    },
    {
      "cve": "CVE-2017-7679",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2017-06-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1463207"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user permitted to modify httpd\u0027s MIME configuration could use this flaw to cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: mod_mime buffer overread",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "RHBZ#1463207",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463207"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7679",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
        }
      ],
      "release_date": "2017-06-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: mod_mime buffer overread"
    },
    {
      "cve": "CVE-2017-9788",
      "cwe": {
        "id": "CWE-456",
        "name": "Missing Initialization of a Variable"
      },
      "discovery_date": "2017-07-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1470748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that the httpd\u0027s mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Uninitialized memory reflection in mod_auth_digest",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "RHBZ#1470748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9788",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34",
          "url": "https://httpd.apache.org/security/vulnerabilities_22.html#2.2.34"
        },
        {
          "category": "external",
          "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27",
          "url": "https://httpd.apache.org/security/vulnerabilities_24.html#2.4.27"
        }
      ],
      "release_date": "2017-07-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        },
        {
          "category": "workaround",
          "details": "If you do not use digest authentication, do not load the \"auth_digest_module\".\n\nFor example, on RHEL 7, this can be done by commenting out or removing the\n\"LoadModule auth_digest_module modules/mod_auth_digest.so\"\nline within the /etc/httpd/conf.modules.d/00-base.conf configuration file and restarting the service.\n\nYou can then use the \"httpd -t -D DUMP_MODULES\" command to verify that the module is no longer loaded.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "httpd: Uninitialized memory reflection in mod_auth_digest"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Hanno B\u00f6ck"
          ]
        }
      ],
      "cve": "CVE-2017-9798",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2017-09-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1490344"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue affects the versions of httpd as shipped with Red Hat Enterprise Linux 5, 6, and 7. This issue affects the versions of httpd24-httpd as shipped with Red Hat Software Collections. Product Security has rated this issue as having Moderate security impact.\n\nIn order to be vulnerable, .htaccess files need to contain an invalid or not globally registered HTTP method in a \"Limit\" directive.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
          "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
          "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "RHBZ#1490344",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490344"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2017-9798",
          "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
          "url": "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html"
        }
      ],
      "release_date": "2017-09-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2017-11-13T17:36:28+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted automatically.",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2017:3194"
        },
        {
          "category": "workaround",
          "details": "This issue can be mitigated by configuring httpd to disallow the use of the \"Limit\" configuration directive in .htaccess files. The set of directives that can be used in .htaccess files is configured using the \"AllowOverride\" directive. Refer to Red Hat Bugzilla bug 1490344 for further details:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=1490344#c18",
          "product_ids": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7ComputeNode-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7ComputeNode-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.src",
            "7Server-optional-7.3.EUS:httpd-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-debuginfo-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-devel-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:httpd-manual-0:2.4.6-45.el7_3.5.noarch",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:httpd-tools-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ldap-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_proxy_html-1:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_session-0:2.4.6-45.el7_3.5.x86_64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.ppc64le",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.s390x",
            "7Server-optional-7.3.EUS:mod_ssl-1:2.4.6-45.el7_3.5.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "httpd: Use-after-free by limiting unregistered HTTP method (Optionsbleed)"
    }
  ]
}
  suse-su-2017:2449-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Recommended update for apache2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThis update for apache2 provides the following fixes:\n\nSecurity issues fixed:\n\n* CVE-2017-9788: The value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.  (bsc#1048576)\n* CVE-2017-7679: mod_mime could have read one byte past the end of a buffer when sending a malicious Content-Type response header leading to information leak or crash. (bsc#1045060)\n* CVE-2017-3169: mod_ssl may have dereferenced a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port leading to crash. (bsc#1045062)\n* CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may have lead to authentication requirements being bypassed.  (bsc#1045065)\n\nNon-security issues fixed:\n\n- Re-order cipher suites to keep exclusion list at the end. (bsc#1043484, bsc#1043607)\n- Remove /usr/bin/http2 link only during apache2 package uninstall, not upgrade. (bsc#1041830)\n- In gensslcert, use hostname when fqdn is too long. (bsc#1035829)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-OpenStack-Cloud-6-2017-1510,SUSE-SLE-SAP-12-SP1-2017-1510,SUSE-SLE-SERVER-12-SP1-2017-1510",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2449-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2017:2449-1",
        "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172449-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2017:2449-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-September/003212.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1035829",
        "url": "https://bugzilla.suse.com/1035829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1041830",
        "url": "https://bugzilla.suse.com/1041830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1043484",
        "url": "https://bugzilla.suse.com/1043484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1043607",
        "url": "https://bugzilla.suse.com/1043607"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1045060",
        "url": "https://bugzilla.suse.com/1045060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1045062",
        "url": "https://bugzilla.suse.com/1045062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1045065",
        "url": "https://bugzilla.suse.com/1045065"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1048576",
        "url": "https://bugzilla.suse.com/1048576"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-3167 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-3167/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-3169 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-3169/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7679 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-9788 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-9788/"
      }
    ],
    "title": "Recommended update for apache2",
    "tracking": {
      "current_release_date": "2017-09-13T10:33:25Z",
      "generator": {
        "date": "2017-09-13T10:33:25Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2017:2449-1",
      "initial_release_date": "2017-09-13T10:33:25Z",
      "revision_history": [
        {
          "date": "2017-09-13T10:33:25Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-doc-2.4.16-20.10.1.noarch",
                "product": {
                  "name": "apache2-doc-2.4.16-20.10.1.noarch",
                  "product_id": "apache2-doc-2.4.16-20.10.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.16-20.10.1.ppc64le",
                "product": {
                  "name": "apache2-2.4.16-20.10.1.ppc64le",
                  "product_id": "apache2-2.4.16-20.10.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.16-20.10.1.ppc64le",
                "product": {
                  "name": "apache2-example-pages-2.4.16-20.10.1.ppc64le",
                  "product_id": "apache2-example-pages-2.4.16-20.10.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.16-20.10.1.ppc64le",
                "product": {
                  "name": "apache2-prefork-2.4.16-20.10.1.ppc64le",
                  "product_id": "apache2-prefork-2.4.16-20.10.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.16-20.10.1.ppc64le",
                "product": {
                  "name": "apache2-utils-2.4.16-20.10.1.ppc64le",
                  "product_id": "apache2-utils-2.4.16-20.10.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.16-20.10.1.ppc64le",
                "product": {
                  "name": "apache2-worker-2.4.16-20.10.1.ppc64le",
                  "product_id": "apache2-worker-2.4.16-20.10.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.16-20.10.1.s390x",
                "product": {
                  "name": "apache2-2.4.16-20.10.1.s390x",
                  "product_id": "apache2-2.4.16-20.10.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.16-20.10.1.s390x",
                "product": {
                  "name": "apache2-example-pages-2.4.16-20.10.1.s390x",
                  "product_id": "apache2-example-pages-2.4.16-20.10.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.16-20.10.1.s390x",
                "product": {
                  "name": "apache2-prefork-2.4.16-20.10.1.s390x",
                  "product_id": "apache2-prefork-2.4.16-20.10.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.16-20.10.1.s390x",
                "product": {
                  "name": "apache2-utils-2.4.16-20.10.1.s390x",
                  "product_id": "apache2-utils-2.4.16-20.10.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.16-20.10.1.s390x",
                "product": {
                  "name": "apache2-worker-2.4.16-20.10.1.s390x",
                  "product_id": "apache2-worker-2.4.16-20.10.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.16-20.10.1.x86_64",
                "product": {
                  "name": "apache2-2.4.16-20.10.1.x86_64",
                  "product_id": "apache2-2.4.16-20.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.16-20.10.1.x86_64",
                "product": {
                  "name": "apache2-example-pages-2.4.16-20.10.1.x86_64",
                  "product_id": "apache2-example-pages-2.4.16-20.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.16-20.10.1.x86_64",
                "product": {
                  "name": "apache2-prefork-2.4.16-20.10.1.x86_64",
                  "product_id": "apache2-prefork-2.4.16-20.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.16-20.10.1.x86_64",
                "product": {
                  "name": "apache2-utils-2.4.16-20.10.1.x86_64",
                  "product_id": "apache2-utils-2.4.16-20.10.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.16-20.10.1.x86_64",
                "product": {
                  "name": "apache2-worker-2.4.16-20.10.1.x86_64",
                  "product_id": "apache2-worker-2.4.16-20.10.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 6",
                "product": {
                  "name": "SUSE OpenStack Cloud 6",
                  "product_id": "SUSE OpenStack Cloud 6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-openstack-cloud:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.16-20.10.1.x86_64 as component of SUSE OpenStack Cloud 6",
          "product_id": "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.16-20.10.1.noarch as component of SUSE OpenStack Cloud 6",
          "product_id": "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.16-20.10.1.noarch",
        "relates_to_product_reference": "SUSE OpenStack Cloud 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.16-20.10.1.x86_64 as component of SUSE OpenStack Cloud 6",
          "product_id": "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.16-20.10.1.x86_64 as component of SUSE OpenStack Cloud 6",
          "product_id": "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.16-20.10.1.x86_64 as component of SUSE OpenStack Cloud 6",
          "product_id": "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.16-20.10.1.x86_64 as component of SUSE OpenStack Cloud 6",
          "product_id": "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.16-20.10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le"
        },
        "product_reference": "apache2-2.4.16-20.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.16-20.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.16-20.10.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.16-20.10.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.16-20.10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.16-20.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.16-20.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.16-20.10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.16-20.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.16-20.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.16-20.10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.16-20.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.16-20.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.16-20.10.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.16-20.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.16-20.10.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.16-20.10.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le"
        },
        "product_reference": "apache2-2.4.16-20.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.16-20.10.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x"
        },
        "product_reference": "apache2-2.4.16-20.10.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.16-20.10.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.16-20.10.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.16-20.10.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.16-20.10.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.16-20.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.16-20.10.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.16-20.10.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.16-20.10.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.16-20.10.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.16-20.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.16-20.10.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.16-20.10.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.16-20.10.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.16-20.10.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.16-20.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.16-20.10.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.16-20.10.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.16-20.10.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.16-20.10.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.16-20.10.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.16-20.10.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.16-20.10.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.16-20.10.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.16-20.10.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-3167"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-3167",
          "url": "https://www.suse.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1045065 for CVE-2017-3167",
          "url": "https://bugzilla.suse.com/1045065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1078450 for CVE-2017-3167",
          "url": "https://bugzilla.suse.com/1078450"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-09-13T10:33:25Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-3167"
    },
    {
      "cve": "CVE-2017-3169",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-3169"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-3169",
          "url": "https://www.suse.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1045062 for CVE-2017-3169",
          "url": "https://bugzilla.suse.com/1045062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1078450 for CVE-2017-3169",
          "url": "https://bugzilla.suse.com/1078450"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-09-13T10:33:25Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-3169"
    },
    {
      "cve": "CVE-2017-7679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7679",
          "url": "https://www.suse.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1045060 for CVE-2017-7679",
          "url": "https://bugzilla.suse.com/1045060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1057861 for CVE-2017-7679",
          "url": "https://bugzilla.suse.com/1057861"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1078450 for CVE-2017-7679",
          "url": "https://bugzilla.suse.com/1078450"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-09-13T10:33:25Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7679"
    },
    {
      "cve": "CVE-2017-9788",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-9788"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
          "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
          "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
          "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-9788",
          "url": "https://www.suse.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1048576 for CVE-2017-9788",
          "url": "https://bugzilla.suse.com/1048576"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.s390x",
            "SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-doc-2.4.16-20.10.1.noarch",
            "SUSE OpenStack Cloud 6:apache2-example-pages-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-prefork-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-utils-2.4.16-20.10.1.x86_64",
            "SUSE OpenStack Cloud 6:apache2-worker-2.4.16-20.10.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-09-13T10:33:25Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-9788"
    }
  ]
}
  suse-su-2017:2756-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for apache2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for apache2 fixes several issues.\n\nThese security issues were fixed:\n    \n- CVE-2017-9798: Prevent use-after-free use of memory that allowed for an\n  information leak via OPTIONS (bsc#1058058)\n- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest could have\n  lead to leakage of potentially confidential information, and a segfault in\n  other cases resulting in DoS (bsc#1048576).\n- CVE-2017-7679: mod_mime could have read one byte past the end of a buffer\n  when sending a malicious Content-Type response header (bsc#1045060).\n- CVE-2017-3169: mod_ssl may dereferenced a NULL pointer when third-party\n  modules call ap_hook_process_connection() during an HTTP request to an HTTPS\n  port allowing for DoS (bsc#1045062).\n- CVE-2017-3167: Use of the ap_get_basic_auth_pw() by third-party modules\n  outside of the authentication phase may have lead to authentication\n  requirements being bypassed (bsc#1045065).\n\nThese non-security issues were fixed:\n\n- remove /usr/bin/http2 symlink only during apache2 package \n  uninstall, not upgrade (bsc#1041830)\n- gensslcert: use hostname when fqdn is too long (bsc#1035829)\n- add NotifyAccess=all to service file (bsc#980663)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-SERVER-12-2017-1709",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2756-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2017:2756-1",
        "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172756-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2017:2756-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003305.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1035829",
        "url": "https://bugzilla.suse.com/1035829"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1041830",
        "url": "https://bugzilla.suse.com/1041830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1045060",
        "url": "https://bugzilla.suse.com/1045060"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1045062",
        "url": "https://bugzilla.suse.com/1045062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1045065",
        "url": "https://bugzilla.suse.com/1045065"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1048576",
        "url": "https://bugzilla.suse.com/1048576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1058058",
        "url": "https://bugzilla.suse.com/1058058"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 980663",
        "url": "https://bugzilla.suse.com/980663"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-3167 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-3167/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-3169 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-3169/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7679 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-9788 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-9788/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-9798 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-9798/"
      }
    ],
    "title": "Security update for apache2",
    "tracking": {
      "current_release_date": "2017-10-18T11:46:36Z",
      "generator": {
        "date": "2017-10-18T11:46:36Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2017:2756-1",
      "initial_release_date": "2017-10-18T11:46:36Z",
      "revision_history": [
        {
          "date": "2017-10-18T11:46:36Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-doc-2.4.10-14.28.1.noarch",
                "product": {
                  "name": "apache2-doc-2.4.10-14.28.1.noarch",
                  "product_id": "apache2-doc-2.4.10-14.28.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.10-14.28.1.ppc64le",
                "product": {
                  "name": "apache2-2.4.10-14.28.1.ppc64le",
                  "product_id": "apache2-2.4.10-14.28.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.10-14.28.1.ppc64le",
                "product": {
                  "name": "apache2-example-pages-2.4.10-14.28.1.ppc64le",
                  "product_id": "apache2-example-pages-2.4.10-14.28.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.10-14.28.1.ppc64le",
                "product": {
                  "name": "apache2-prefork-2.4.10-14.28.1.ppc64le",
                  "product_id": "apache2-prefork-2.4.10-14.28.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.10-14.28.1.ppc64le",
                "product": {
                  "name": "apache2-utils-2.4.10-14.28.1.ppc64le",
                  "product_id": "apache2-utils-2.4.10-14.28.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.10-14.28.1.ppc64le",
                "product": {
                  "name": "apache2-worker-2.4.10-14.28.1.ppc64le",
                  "product_id": "apache2-worker-2.4.10-14.28.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.10-14.28.1.s390x",
                "product": {
                  "name": "apache2-2.4.10-14.28.1.s390x",
                  "product_id": "apache2-2.4.10-14.28.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.10-14.28.1.s390x",
                "product": {
                  "name": "apache2-example-pages-2.4.10-14.28.1.s390x",
                  "product_id": "apache2-example-pages-2.4.10-14.28.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.10-14.28.1.s390x",
                "product": {
                  "name": "apache2-prefork-2.4.10-14.28.1.s390x",
                  "product_id": "apache2-prefork-2.4.10-14.28.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.10-14.28.1.s390x",
                "product": {
                  "name": "apache2-utils-2.4.10-14.28.1.s390x",
                  "product_id": "apache2-utils-2.4.10-14.28.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.10-14.28.1.s390x",
                "product": {
                  "name": "apache2-worker-2.4.10-14.28.1.s390x",
                  "product_id": "apache2-worker-2.4.10-14.28.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.10-14.28.1.x86_64",
                "product": {
                  "name": "apache2-2.4.10-14.28.1.x86_64",
                  "product_id": "apache2-2.4.10-14.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.10-14.28.1.x86_64",
                "product": {
                  "name": "apache2-example-pages-2.4.10-14.28.1.x86_64",
                  "product_id": "apache2-example-pages-2.4.10-14.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.10-14.28.1.x86_64",
                "product": {
                  "name": "apache2-prefork-2.4.10-14.28.1.x86_64",
                  "product_id": "apache2-prefork-2.4.10-14.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.10-14.28.1.x86_64",
                "product": {
                  "name": "apache2-utils-2.4.10-14.28.1.x86_64",
                  "product_id": "apache2-utils-2.4.10-14.28.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.10-14.28.1.x86_64",
                "product": {
                  "name": "apache2-worker-2.4.10-14.28.1.x86_64",
                  "product_id": "apache2-worker-2.4.10-14.28.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.10-14.28.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le"
        },
        "product_reference": "apache2-2.4.10-14.28.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.10-14.28.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x"
        },
        "product_reference": "apache2-2.4.10-14.28.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.10-14.28.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64"
        },
        "product_reference": "apache2-2.4.10-14.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.10-14.28.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch"
        },
        "product_reference": "apache2-doc-2.4.10-14.28.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.10-14.28.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.10-14.28.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.10-14.28.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.10-14.28.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.10-14.28.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.10-14.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.10-14.28.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.10-14.28.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.10-14.28.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x"
        },
        "product_reference": "apache2-prefork-2.4.10-14.28.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.10-14.28.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.10-14.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.10-14.28.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.10-14.28.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.10-14.28.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x"
        },
        "product_reference": "apache2-utils-2.4.10-14.28.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.10-14.28.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64"
        },
        "product_reference": "apache2-utils-2.4.10-14.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.10-14.28.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.10-14.28.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.10-14.28.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x"
        },
        "product_reference": "apache2-worker-2.4.10-14.28.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.10-14.28.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
        },
        "product_reference": "apache2-worker-2.4.10-14.28.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-3167",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-3167"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-3167",
          "url": "https://www.suse.com/security/cve/CVE-2017-3167"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1045065 for CVE-2017-3167",
          "url": "https://bugzilla.suse.com/1045065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1078450 for CVE-2017-3167",
          "url": "https://bugzilla.suse.com/1078450"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-10-18T11:46:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-3167"
    },
    {
      "cve": "CVE-2017-3169",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-3169"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-3169",
          "url": "https://www.suse.com/security/cve/CVE-2017-3169"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1045062 for CVE-2017-3169",
          "url": "https://bugzilla.suse.com/1045062"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1078450 for CVE-2017-3169",
          "url": "https://bugzilla.suse.com/1078450"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-10-18T11:46:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-3169"
    },
    {
      "cve": "CVE-2017-7679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7679",
          "url": "https://www.suse.com/security/cve/CVE-2017-7679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1045060 for CVE-2017-7679",
          "url": "https://bugzilla.suse.com/1045060"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1057861 for CVE-2017-7679",
          "url": "https://bugzilla.suse.com/1057861"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1078450 for CVE-2017-7679",
          "url": "https://bugzilla.suse.com/1078450"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-10-18T11:46:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-7679"
    },
    {
      "cve": "CVE-2017-9788",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-9788"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-9788",
          "url": "https://www.suse.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1048576 for CVE-2017-9788",
          "url": "https://bugzilla.suse.com/1048576"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-10-18T11:46:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-9788"
    },
    {
      "cve": "CVE-2017-9798",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-9798"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user\u0027s .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
          "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-9798",
          "url": "https://www.suse.com/security/cve/CVE-2017-9798"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1058058 for CVE-2017-9798",
          "url": "https://bugzilla.suse.com/1058058"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1060757 for CVE-2017-9798",
          "url": "https://bugzilla.suse.com/1060757"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1077582 for CVE-2017-9798",
          "url": "https://bugzilla.suse.com/1077582"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1078450 for CVE-2017-9798",
          "url": "https://bugzilla.suse.com/1078450"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089997 for CVE-2017-9798",
          "url": "https://bugzilla.suse.com/1089997"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-doc-2.4.10-14.28.1.noarch",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-example-pages-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-prefork-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-utils-2.4.10-14.28.1.x86_64",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.ppc64le",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.s390x",
            "SUSE Linux Enterprise Server 12-LTSS:apache2-worker-2.4.10-14.28.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-10-18T11:46:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-9798"
    }
  ]
}
  suse-su-2017:1961-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for apache2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for apache2 fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)\n\nBug fixes:\n\n- Include individual sysconfig.d files instead of the whole sysconfig.d directory.\n- Include sysconfig.d/include.conf after httpd.conf is processed. (bsc#1023616, bsc#1043055)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-SLE-RPI-12-SP2-2017-1220,SUSE-SLE-SDK-12-SP2-2017-1220,SUSE-SLE-SDK-12-SP3-2017-1220,SUSE-SLE-SERVER-12-SP2-2017-1220,SUSE-SLE-SERVER-12-SP3-2017-1220",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1961-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2017:1961-1",
        "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171961-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2017:1961-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-July/003068.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1023616",
        "url": "https://bugzilla.suse.com/1023616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1043055",
        "url": "https://bugzilla.suse.com/1043055"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1048576",
        "url": "https://bugzilla.suse.com/1048576"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-9788 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-9788/"
      }
    ],
    "title": "Security update for apache2",
    "tracking": {
      "current_release_date": "2017-07-26T12:16:37Z",
      "generator": {
        "date": "2017-07-26T12:16:37Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2017:1961-1",
      "initial_release_date": "2017-07-26T12:16:37Z",
      "revision_history": [
        {
          "date": "2017-07-26T12:16:37Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.4.23-29.3.2.aarch64",
                "product": {
                  "name": "apache2-2.4.23-29.3.2.aarch64",
                  "product_id": "apache2-2.4.23-29.3.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.23-29.3.2.aarch64",
                "product": {
                  "name": "apache2-example-pages-2.4.23-29.3.2.aarch64",
                  "product_id": "apache2-example-pages-2.4.23-29.3.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.23-29.3.2.aarch64",
                "product": {
                  "name": "apache2-prefork-2.4.23-29.3.2.aarch64",
                  "product_id": "apache2-prefork-2.4.23-29.3.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.23-29.3.2.aarch64",
                "product": {
                  "name": "apache2-utils-2.4.23-29.3.2.aarch64",
                  "product_id": "apache2-utils-2.4.23-29.3.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.23-29.3.2.aarch64",
                "product": {
                  "name": "apache2-worker-2.4.23-29.3.2.aarch64",
                  "product_id": "apache2-worker-2.4.23-29.3.2.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.23-29.3.2.aarch64",
                "product": {
                  "name": "apache2-devel-2.4.23-29.3.2.aarch64",
                  "product_id": "apache2-devel-2.4.23-29.3.2.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-doc-2.4.23-29.3.2.noarch",
                "product": {
                  "name": "apache2-doc-2.4.23-29.3.2.noarch",
                  "product_id": "apache2-doc-2.4.23-29.3.2.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.23-29.3.2.ppc64le",
                "product": {
                  "name": "apache2-devel-2.4.23-29.3.2.ppc64le",
                  "product_id": "apache2-devel-2.4.23-29.3.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-2.4.23-29.3.2.ppc64le",
                "product": {
                  "name": "apache2-2.4.23-29.3.2.ppc64le",
                  "product_id": "apache2-2.4.23-29.3.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.23-29.3.2.ppc64le",
                "product": {
                  "name": "apache2-example-pages-2.4.23-29.3.2.ppc64le",
                  "product_id": "apache2-example-pages-2.4.23-29.3.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.23-29.3.2.ppc64le",
                "product": {
                  "name": "apache2-prefork-2.4.23-29.3.2.ppc64le",
                  "product_id": "apache2-prefork-2.4.23-29.3.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.23-29.3.2.ppc64le",
                "product": {
                  "name": "apache2-utils-2.4.23-29.3.2.ppc64le",
                  "product_id": "apache2-utils-2.4.23-29.3.2.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.23-29.3.2.ppc64le",
                "product": {
                  "name": "apache2-worker-2.4.23-29.3.2.ppc64le",
                  "product_id": "apache2-worker-2.4.23-29.3.2.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.23-29.3.2.s390x",
                "product": {
                  "name": "apache2-devel-2.4.23-29.3.2.s390x",
                  "product_id": "apache2-devel-2.4.23-29.3.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-2.4.23-29.3.2.s390x",
                "product": {
                  "name": "apache2-2.4.23-29.3.2.s390x",
                  "product_id": "apache2-2.4.23-29.3.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.23-29.3.2.s390x",
                "product": {
                  "name": "apache2-example-pages-2.4.23-29.3.2.s390x",
                  "product_id": "apache2-example-pages-2.4.23-29.3.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.23-29.3.2.s390x",
                "product": {
                  "name": "apache2-prefork-2.4.23-29.3.2.s390x",
                  "product_id": "apache2-prefork-2.4.23-29.3.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.23-29.3.2.s390x",
                "product": {
                  "name": "apache2-utils-2.4.23-29.3.2.s390x",
                  "product_id": "apache2-utils-2.4.23-29.3.2.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.23-29.3.2.s390x",
                "product": {
                  "name": "apache2-worker-2.4.23-29.3.2.s390x",
                  "product_id": "apache2-worker-2.4.23-29.3.2.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-devel-2.4.23-29.3.2.x86_64",
                "product": {
                  "name": "apache2-devel-2.4.23-29.3.2.x86_64",
                  "product_id": "apache2-devel-2.4.23-29.3.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-2.4.23-29.3.2.x86_64",
                "product": {
                  "name": "apache2-2.4.23-29.3.2.x86_64",
                  "product_id": "apache2-2.4.23-29.3.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.4.23-29.3.2.x86_64",
                "product": {
                  "name": "apache2-example-pages-2.4.23-29.3.2.x86_64",
                  "product_id": "apache2-example-pages-2.4.23-29.3.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.4.23-29.3.2.x86_64",
                "product": {
                  "name": "apache2-prefork-2.4.23-29.3.2.x86_64",
                  "product_id": "apache2-prefork-2.4.23-29.3.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.4.23-29.3.2.x86_64",
                "product": {
                  "name": "apache2-utils-2.4.23-29.3.2.x86_64",
                  "product_id": "apache2-utils-2.4.23-29.3.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.4.23-29.3.2.x86_64",
                "product": {
                  "name": "apache2-worker-2.4.23-29.3.2.x86_64",
                  "product_id": "apache2-worker-2.4.23-29.3.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
                  "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP2",
                  "product_id": "SUSE Linux Enterprise Server 12 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.3.2.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.3.2.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.3.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-devel-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-devel-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-devel-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-devel-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-devel-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-devel-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-devel-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-devel-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.3.2.noarch as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.3.2.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.3.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
          "product_id": "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.3.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.3.2.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.3.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.3.2.noarch as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.3.2.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.3.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.4.23-29.3.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.3.2.noarch"
        },
        "product_reference": "apache2-doc-2.4.23-29.3.2.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-example-pages-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-prefork-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-utils-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.aarch64"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.ppc64le"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.s390x"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.4.23-29.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.x86_64"
        },
        "product_reference": "apache2-worker-2.4.23-29.3.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-9788",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-9788"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.3.2.noarch",
          "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.3.2.noarch",
          "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.3.2.noarch",
          "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.3.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.3.2.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-9788",
          "url": "https://www.suse.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1048576 for CVE-2017-9788",
          "url": "https://bugzilla.suse.com/1048576"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.3.2.noarch",
            "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.3.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.3.2.noarch",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.3.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.3.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP2:apache2-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-doc-2.4.23-29.3.2.noarch",
            "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP2:apache2-example-pages-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP2:apache2-prefork-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP2:apache2-utils-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP2:apache2-worker-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP3:apache2-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-doc-2.4.23-29.3.2.noarch",
            "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP3:apache2-example-pages-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP3:apache2-prefork-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP3:apache2-utils-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server 12 SP3:apache2-worker-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-doc-2.4.23-29.3.2.noarch",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-doc-2.4.23-29.3.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-example-pages-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-prefork-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-utils-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP2:apache2-worker-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-doc-2.4.23-29.3.2.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-example-pages-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-prefork-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-utils-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:apache2-worker-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP2:apache2-devel-2.4.23-29.3.2.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:apache2-devel-2.4.23-29.3.2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-07-26T12:16:37Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-9788"
    }
  ]
}
  suse-su-2017:1997-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for apache2",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update provides apache2 2.2.34, which brings many fixes and enhancements:\n\nSecurity issues fixed:\n\n- CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest. (bsc#1048576)\n\nBug fixes:\n\n- Remove /usr/bin/http2 link only during package uninstall, not upgrade. (bsc#1041830)\n- Don\u0027t put the backend in error state (by default) when 500/503 error code is overridden. (bsc#951692)\n- Allow single-char field names inadvertently disallowed in 2.2.32.\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "sdksp4-apache2-13223,slessp4-apache2-13223,slestso13-apache2-13223",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1997-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2017:1997-1",
        "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171997-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2017:1997-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-July/003074.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1041830",
        "url": "https://bugzilla.suse.com/1041830"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1048576",
        "url": "https://bugzilla.suse.com/1048576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 951692",
        "url": "https://bugzilla.suse.com/951692"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-9788 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-9788/"
      }
    ],
    "title": "Security update for apache2",
    "tracking": {
      "current_release_date": "2017-07-28T13:21:00Z",
      "generator": {
        "date": "2017-07-28T13:21:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2017:1997-1",
      "initial_release_date": "2017-07-28T13:21:00Z",
      "revision_history": [
        {
          "date": "2017-07-28T13:21:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.2.34-70.5.1.i586",
                "product": {
                  "name": "apache2-2.2.34-70.5.1.i586",
                  "product_id": "apache2-2.2.34-70.5.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.2.34-70.5.1.i586",
                "product": {
                  "name": "apache2-devel-2.2.34-70.5.1.i586",
                  "product_id": "apache2-devel-2.2.34-70.5.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-doc-2.2.34-70.5.1.i586",
                "product": {
                  "name": "apache2-doc-2.2.34-70.5.1.i586",
                  "product_id": "apache2-doc-2.2.34-70.5.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.2.34-70.5.1.i586",
                "product": {
                  "name": "apache2-example-pages-2.2.34-70.5.1.i586",
                  "product_id": "apache2-example-pages-2.2.34-70.5.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.2.34-70.5.1.i586",
                "product": {
                  "name": "apache2-prefork-2.2.34-70.5.1.i586",
                  "product_id": "apache2-prefork-2.2.34-70.5.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.2.34-70.5.1.i586",
                "product": {
                  "name": "apache2-utils-2.2.34-70.5.1.i586",
                  "product_id": "apache2-utils-2.2.34-70.5.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.2.34-70.5.1.i586",
                "product": {
                  "name": "apache2-worker-2.2.34-70.5.1.i586",
                  "product_id": "apache2-worker-2.2.34-70.5.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-devel-2.2.34-70.5.1.ia64",
                "product": {
                  "name": "apache2-devel-2.2.34-70.5.1.ia64",
                  "product_id": "apache2-devel-2.2.34-70.5.1.ia64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-2.2.34-70.5.1.ia64",
                "product": {
                  "name": "apache2-2.2.34-70.5.1.ia64",
                  "product_id": "apache2-2.2.34-70.5.1.ia64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-doc-2.2.34-70.5.1.ia64",
                "product": {
                  "name": "apache2-doc-2.2.34-70.5.1.ia64",
                  "product_id": "apache2-doc-2.2.34-70.5.1.ia64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.2.34-70.5.1.ia64",
                "product": {
                  "name": "apache2-example-pages-2.2.34-70.5.1.ia64",
                  "product_id": "apache2-example-pages-2.2.34-70.5.1.ia64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.2.34-70.5.1.ia64",
                "product": {
                  "name": "apache2-prefork-2.2.34-70.5.1.ia64",
                  "product_id": "apache2-prefork-2.2.34-70.5.1.ia64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.2.34-70.5.1.ia64",
                "product": {
                  "name": "apache2-utils-2.2.34-70.5.1.ia64",
                  "product_id": "apache2-utils-2.2.34-70.5.1.ia64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.2.34-70.5.1.ia64",
                "product": {
                  "name": "apache2-worker-2.2.34-70.5.1.ia64",
                  "product_id": "apache2-worker-2.2.34-70.5.1.ia64"
                }
              }
            ],
            "category": "architecture",
            "name": "ia64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-devel-2.2.34-70.5.1.ppc64",
                "product": {
                  "name": "apache2-devel-2.2.34-70.5.1.ppc64",
                  "product_id": "apache2-devel-2.2.34-70.5.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-2.2.34-70.5.1.ppc64",
                "product": {
                  "name": "apache2-2.2.34-70.5.1.ppc64",
                  "product_id": "apache2-2.2.34-70.5.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-doc-2.2.34-70.5.1.ppc64",
                "product": {
                  "name": "apache2-doc-2.2.34-70.5.1.ppc64",
                  "product_id": "apache2-doc-2.2.34-70.5.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.2.34-70.5.1.ppc64",
                "product": {
                  "name": "apache2-example-pages-2.2.34-70.5.1.ppc64",
                  "product_id": "apache2-example-pages-2.2.34-70.5.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.2.34-70.5.1.ppc64",
                "product": {
                  "name": "apache2-prefork-2.2.34-70.5.1.ppc64",
                  "product_id": "apache2-prefork-2.2.34-70.5.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.2.34-70.5.1.ppc64",
                "product": {
                  "name": "apache2-utils-2.2.34-70.5.1.ppc64",
                  "product_id": "apache2-utils-2.2.34-70.5.1.ppc64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.2.34-70.5.1.ppc64",
                "product": {
                  "name": "apache2-worker-2.2.34-70.5.1.ppc64",
                  "product_id": "apache2-worker-2.2.34-70.5.1.ppc64"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-devel-2.2.34-70.5.1.s390x",
                "product": {
                  "name": "apache2-devel-2.2.34-70.5.1.s390x",
                  "product_id": "apache2-devel-2.2.34-70.5.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-2.2.34-70.5.1.s390x",
                "product": {
                  "name": "apache2-2.2.34-70.5.1.s390x",
                  "product_id": "apache2-2.2.34-70.5.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-doc-2.2.34-70.5.1.s390x",
                "product": {
                  "name": "apache2-doc-2.2.34-70.5.1.s390x",
                  "product_id": "apache2-doc-2.2.34-70.5.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.2.34-70.5.1.s390x",
                "product": {
                  "name": "apache2-example-pages-2.2.34-70.5.1.s390x",
                  "product_id": "apache2-example-pages-2.2.34-70.5.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.2.34-70.5.1.s390x",
                "product": {
                  "name": "apache2-prefork-2.2.34-70.5.1.s390x",
                  "product_id": "apache2-prefork-2.2.34-70.5.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.2.34-70.5.1.s390x",
                "product": {
                  "name": "apache2-utils-2.2.34-70.5.1.s390x",
                  "product_id": "apache2-utils-2.2.34-70.5.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.2.34-70.5.1.s390x",
                "product": {
                  "name": "apache2-worker-2.2.34-70.5.1.s390x",
                  "product_id": "apache2-worker-2.2.34-70.5.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "apache2-2.2.34-70.5.1.x86_64",
                "product": {
                  "name": "apache2-2.2.34-70.5.1.x86_64",
                  "product_id": "apache2-2.2.34-70.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-devel-2.2.34-70.5.1.x86_64",
                "product": {
                  "name": "apache2-devel-2.2.34-70.5.1.x86_64",
                  "product_id": "apache2-devel-2.2.34-70.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-doc-2.2.34-70.5.1.x86_64",
                "product": {
                  "name": "apache2-doc-2.2.34-70.5.1.x86_64",
                  "product_id": "apache2-doc-2.2.34-70.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-example-pages-2.2.34-70.5.1.x86_64",
                "product": {
                  "name": "apache2-example-pages-2.2.34-70.5.1.x86_64",
                  "product_id": "apache2-example-pages-2.2.34-70.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-prefork-2.2.34-70.5.1.x86_64",
                "product": {
                  "name": "apache2-prefork-2.2.34-70.5.1.x86_64",
                  "product_id": "apache2-prefork-2.2.34-70.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-utils-2.2.34-70.5.1.x86_64",
                "product": {
                  "name": "apache2-utils-2.2.34-70.5.1.x86_64",
                  "product_id": "apache2-utils-2.2.34-70.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "apache2-worker-2.2.34-70.5.1.x86_64",
                "product": {
                  "name": "apache2-worker-2.2.34-70.5.1.x86_64",
                  "product_id": "apache2-worker-2.2.34-70.5.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:suse:sle-sdk:11:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP4",
                  "product_id": "SUSE Linux Enterprise Server 11 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_sles:11:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:11:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Studio Onsite 1.3",
                "product": {
                  "name": "SUSE Studio Onsite 1.3",
                  "product_id": "SUSE Studio Onsite 1.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-studioonsite:1.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-devel-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-devel-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-devel-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-devel-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-devel-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
          "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
          "product_id": "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-doc-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-doc-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-example-pages-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-example-pages-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-prefork-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-prefork-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-utils-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-utils-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.i586"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.ia64"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.ia64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.ppc64"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.ppc64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.s390x"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-worker-2.2.34-70.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-worker-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "apache2-devel-2.2.34-70.5.1.x86_64 as component of SUSE Studio Onsite 1.3",
          "product_id": "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.5.1.x86_64"
        },
        "product_reference": "apache2-devel-2.2.34-70.5.1.x86_64",
        "relates_to_product_reference": "SUSE Studio Onsite 1.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-9788",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-9788"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.ia64",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.ppc64",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.5.1.i586",
          "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64",
          "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-9788",
          "url": "https://www.suse.com/security/cve/CVE-2017-9788"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1048576 for CVE-2017-9788",
          "url": "https://bugzilla.suse.com/1048576"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64",
            "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.ia64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.ppc64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-devel-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-doc-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-example-pages-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-prefork-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-utils-2.2.34-70.5.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.5.1.i586",
            "SUSE Linux Enterprise Software Development Kit 11 SP4:apache2-worker-2.2.34-70.5.1.x86_64",
            "SUSE Studio Onsite 1.3:apache2-devel-2.2.34-70.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2017-07-28T13:21:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-9788"
    }
  ]
}
  gsd-2017-9788
Vulnerability from gsd
{
  "GSD": {
    "alias": "CVE-2017-9788",
    "description": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.",
    "id": "GSD-2017-9788",
    "references": [
      "https://www.suse.com/security/cve/CVE-2017-9788.html",
      "https://www.debian.org/security/2017/dsa-3913",
      "https://access.redhat.com/errata/RHSA-2017:3240",
      "https://access.redhat.com/errata/RHSA-2017:3239",
      "https://access.redhat.com/errata/RHSA-2017:3195",
      "https://access.redhat.com/errata/RHSA-2017:3194",
      "https://access.redhat.com/errata/RHSA-2017:3193",
      "https://access.redhat.com/errata/RHSA-2017:3114",
      "https://access.redhat.com/errata/RHSA-2017:3113",
      "https://access.redhat.com/errata/RHSA-2017:2710",
      "https://access.redhat.com/errata/RHSA-2017:2709",
      "https://access.redhat.com/errata/RHSA-2017:2708",
      "https://access.redhat.com/errata/RHSA-2017:2483",
      "https://access.redhat.com/errata/RHSA-2017:2479",
      "https://access.redhat.com/errata/RHSA-2017:2478",
      "https://ubuntu.com/security/CVE-2017-9788",
      "https://advisories.mageia.org/CVE-2017-9788.html",
      "https://security.archlinux.org/CVE-2017-9788",
      "https://alas.aws.amazon.com/cve/html/CVE-2017-9788.html",
      "https://linux.oracle.com/cve/CVE-2017-9788.html"
    ]
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2017-9788"
      ],
      "details": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.",
      "id": "GSD-2017-9788",
      "modified": "2023-12-13T01:21:07.452270Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security@apache.org",
        "DATE_PUBLIC": "2017-07-13T00:00:00",
        "ID": "CVE-2017-9788",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Apache HTTP Server",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "2.2.0 to 2.2.33"
                        },
                        {
                          "version_value": "2.4.1 to 2.4.26"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Apache Software Foundation"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "Uninitialized memory reflection in mod_auth_digest"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "RHSA-2017:3113",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:3113"
          },
          {
            "name": "https://support.apple.com/HT208221",
            "refsource": "CONFIRM",
            "url": "https://support.apple.com/HT208221"
          },
          {
            "name": "RHSA-2017:2479",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:2479"
          },
          {
            "name": "RHSA-2017:2483",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:2483"
          },
          {
            "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us",
            "refsource": "CONFIRM",
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us"
          },
          {
            "name": "https://httpd.apache.org/security/vulnerabilities_22.html",
            "refsource": "CONFIRM",
            "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
          },
          {
            "name": "https://security.netapp.com/advisory/ntap-20170911-0002/",
            "refsource": "CONFIRM",
            "url": "https://security.netapp.com/advisory/ntap-20170911-0002/"
          },
          {
            "name": "RHSA-2017:3240",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:3240"
          },
          {
            "name": "RHSA-2017:2709",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:2709"
          },
          {
            "name": "RHSA-2017:3195",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:3195"
          },
          {
            "name": "[announce] 20170713 CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E"
          },
          {
            "name": "99569",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/99569"
          },
          {
            "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
            "refsource": "CONFIRM",
            "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
          },
          {
            "name": "RHSA-2017:3239",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:3239"
          },
          {
            "name": "RHSA-2017:3114",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:3114"
          },
          {
            "name": "https://httpd.apache.org/security/vulnerabilities_24.html",
            "refsource": "CONFIRM",
            "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
          },
          {
            "name": "RHSA-2017:3194",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:3194"
          },
          {
            "name": "1038906",
            "refsource": "SECTRACK",
            "url": "http://www.securitytracker.com/id/1038906"
          },
          {
            "name": "RHSA-2017:3193",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:3193"
          },
          {
            "name": "RHSA-2017:2710",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:2710"
          },
          {
            "name": "DSA-3913",
            "refsource": "DEBIAN",
            "url": "http://www.debian.org/security/2017/dsa-3913"
          },
          {
            "name": "RHSA-2017:2708",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:2708"
          },
          {
            "name": "GLSA-201710-32",
            "refsource": "GENTOO",
            "url": "https://security.gentoo.org/glsa/201710-32"
          },
          {
            "name": "RHSA-2017:2478",
            "refsource": "REDHAT",
            "url": "https://access.redhat.com/errata/RHSA-2017:2478"
          },
          {
            "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "https://www.tenable.com/security/tns-2019-09",
            "refsource": "CONFIRM",
            "url": "https://www.tenable.com/security/tns-2019-09"
          },
          {
            "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210422 svn commit: r1074079 [2/3] - in /websites/staging/httpd/trunk/content: ./ apreq/ contribute/ contributors/ dev/ docs-project/ docs/ info/ mod_fcgid/ mod_ftp/ mod_mbox/ mod_smtpd/ modules/ security/ test/ test/flood/",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E"
          },
          {
            "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
            "refsource": "MLIST",
            "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.4.26",
                "versionStartIncluding": "2.4.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.2.33",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "10.13.1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:oracle:secure_global_desktop:5.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "security@apache.org",
          "ID": "CVE-2017-9788"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-200"
                },
                {
                  "lang": "en",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[announce] 20170713 CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest",
              "refsource": "MLIST",
              "tags": [
                "Mailing List",
                "Vendor Advisory",
                "Mitigation"
              ],
              "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E"
            },
            {
              "name": "https://httpd.apache.org/security/vulnerabilities_24.html",
              "refsource": "CONFIRM",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
            },
            {
              "name": "https://httpd.apache.org/security/vulnerabilities_22.html",
              "refsource": "CONFIRM",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
            },
            {
              "name": "1038906",
              "refsource": "SECTRACK",
              "tags": [
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "http://www.securitytracker.com/id/1038906"
            },
            {
              "name": "99569",
              "refsource": "BID",
              "tags": [
                "Third Party Advisory",
                "VDB Entry"
              ],
              "url": "http://www.securityfocus.com/bid/99569"
            },
            {
              "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
              "refsource": "CONFIRM",
              "tags": [
                "Patch",
                "Third Party Advisory"
              ],
              "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
            },
            {
              "name": "GLSA-201710-32",
              "refsource": "GENTOO",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.gentoo.org/glsa/201710-32"
            },
            {
              "name": "DSA-3913",
              "refsource": "DEBIAN",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "http://www.debian.org/security/2017/dsa-3913"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20170911-0002/",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://security.netapp.com/advisory/ntap-20170911-0002/"
            },
            {
              "name": "https://support.apple.com/HT208221",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://support.apple.com/HT208221"
            },
            {
              "name": "RHSA-2017:3240",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:3240"
            },
            {
              "name": "RHSA-2017:3239",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:3239"
            },
            {
              "name": "RHSA-2017:3195",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:3195"
            },
            {
              "name": "RHSA-2017:3194",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:3194"
            },
            {
              "name": "RHSA-2017:3193",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:3193"
            },
            {
              "name": "RHSA-2017:3114",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:3114"
            },
            {
              "name": "RHSA-2017:3113",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:3113"
            },
            {
              "name": "RHSA-2017:2710",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:2710"
            },
            {
              "name": "RHSA-2017:2709",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:2709"
            },
            {
              "name": "RHSA-2017:2708",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:2708"
            },
            {
              "name": "RHSA-2017:2483",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:2483"
            },
            {
              "name": "RHSA-2017:2479",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:2479"
            },
            {
              "name": "RHSA-2017:2478",
              "refsource": "REDHAT",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://access.redhat.com/errata/RHSA-2017:2478"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us",
              "refsource": "CONFIRM",
              "tags": [
                "Third Party Advisory"
              ],
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us"
            },
            {
              "name": "[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "https://www.tenable.com/security/tns-2019-09",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "https://www.tenable.com/security/tns-2019-09"
            },
            {
              "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073139 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073149 [11/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1888194 [11/13] - /httpd/site/trunk/content/security/json/",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210422 svn commit: r1074079 [2/3] - in /websites/staging/httpd/trunk/content: ./ apreq/ contribute/ contributors/ dev/ docs-project/ docs/ info/ mod_fcgid/ mod_ftp/ mod_mbox/ mod_smtpd/ modules/ security/ test/ test/flood/",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E"
            },
            {
              "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
              "refsource": "MLIST",
              "tags": [],
              "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "acInsufInfo": false,
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 10.0,
          "impactScore": 4.9,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        },
        "baseMetricV3": {
          "cvssV3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.0"
          },
          "exploitabilityScore": 3.9,
          "impactScore": 5.2
        }
      },
      "lastModifiedDate": "2021-06-06T11:15Z",
      "publishedDate": "2017-07-13T16:29Z"
    }
  }
}
  cnvd-2017-23346
Vulnerability from cnvd
厂商已发布漏洞修复程序,请及时关注更新: https://httpd.apache.org/security/vulnerabilities_22.html
| Name | ['Apache Apache <2.2.34', 'Apache Apache 2.4.*,<2.4.27'] | 
|---|
{
  "bids": {
    "bid": {
      "bidNumber": "99569"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-9788"
    }
  },
  "description": "Apache HTTP Server\u662fApache\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u4e2a\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u7f51\u9875\u670d\u52a1\u5668\u3002\r\n\r\nApache HTTP Server mod_auth_digest\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u7684\u8bf7\u6c42\uff0c\u83b7\u53d6\u654f\u611f\u4fe1\u606f\uff0c\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
  "discovererName": "Robert Swiecki",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://httpd.apache.org/security/vulnerabilities_22.html",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-23346",
  "openTime": "2017-08-28",
  "patchDescription": "Apache HTTP Server\u662fApache\u8f6f\u4ef6\u57fa\u91d1\u4f1a\u7684\u4e00\u4e2a\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u7f51\u9875\u670d\u52a1\u5668\u3002\r\n\r\nApache HTTP Server mod_auth_digest\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u7684\u8bf7\u6c42\uff0c\u83b7\u53d6\u654f\u611f\u4fe1\u606f\uff0c\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u6216\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Apache httpd \u0027mod_auth_digest\u0027\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Apache Apache \u003c2.2.34",
      "Apache Apache  2.4.*\uff0c\u003c2.4.27"
    ]
  },
  "referenceLink": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E",
  "serverity": "\u4e2d",
  "submitTime": "2017-07-14",
  "title": "Apache httpd \u0027mod_auth_digest\u0027\u5185\u5b58\u7834\u574f\u6f0f\u6d1e"
}
  ghsa-w97h-p5ff-7q69
Vulnerability from github
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.
{
  "affected": [],
  "aliases": [
    "CVE-2017-9788"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-20",
      "CWE-200"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2017-07-13T16:29:00Z",
    "severity": "CRITICAL"
  },
  "details": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.",
  "id": "GHSA-w97h-p5ff-7q69",
  "modified": "2025-04-20T03:40:43Z",
  "published": "2022-05-13T01:09:41Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9788"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://security.gentoo.org/glsa/201710-32"
    },
    {
      "type": "WEB",
      "url": "https://security.netapp.com/advisory/ntap-20170911-0002"
    },
    {
      "type": "WEB",
      "url": "https://support.apple.com/HT208221"
    },
    {
      "type": "WEB",
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us"
    },
    {
      "type": "WEB",
      "url": "https://www.tenable.com/security/tns-2019-09"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
    },
    {
      "type": "WEB",
      "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:3240"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:3239"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:3195"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:3194"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:3193"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:3114"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:3113"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:2710"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:2709"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:2708"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:2483"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:2479"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2017:2478"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E"
    },
    {
      "type": "WEB",
      "url": "http://www.debian.org/security/2017/dsa-3913"
    },
    {
      "type": "WEB",
      "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/99569"
    },
    {
      "type": "WEB",
      "url": "http://www.securitytracker.com/id/1038906"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  CERTFR-2017-AVI-385
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Apple . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | iOS versions antérieures à 11.1 | ||
| Apple | N/A | watchOS versions antérieures à 4.1 | ||
| Apple | macOS | macOS Sierra versions sans le correctif de sécurité 2017-001 | ||
| Apple | N/A | tvOS versions antérieures à 11.1 | ||
| Apple | macOS | macOS El Capitan sans le correctif de sécurité 2017-004 | ||
| Apple | N/A | iTunes versions antérieures à 12.7.1 sur Windows | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 7.1 | ||
| Apple | Safari | Safari versions antérieures à 11.0.1 | ||
| Apple | macOS | macOS High Sierra versions antérieures à 10.13.1 | 
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              |||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "iOS versions ant\u00e9rieures \u00e0 11.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "watchOS versions ant\u00e9rieures \u00e0 4.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS Sierra versions sans le correctif de s\u00e9curit\u00e9 2017-001",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "tvOS versions ant\u00e9rieures \u00e0 11.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS El Capitan sans le correctif de s\u00e9curit\u00e9 2017-004",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iTunes versions ant\u00e9rieures \u00e0 12.7.1 sur Windows",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 7.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Safari versions ant\u00e9rieures \u00e0 11.0.1",
      "product": {
        "name": "Safari",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.1",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2017-13802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13802"
    },
    {
      "name": "CVE-2017-13818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13818"
    },
    {
      "name": "CVE-2017-13052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13052"
    },
    {
      "name": "CVE-2017-12993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12993"
    },
    {
      "name": "CVE-2017-13018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13018"
    },
    {
      "name": "CVE-2017-13043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13043"
    },
    {
      "name": "CVE-2017-3169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
    },
    {
      "name": "CVE-2017-9789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9789"
    },
    {
      "name": "CVE-2017-7659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7659"
    },
    {
      "name": "CVE-2016-4736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4736"
    },
    {
      "name": "CVE-2017-13050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13050"
    },
    {
      "name": "CVE-2017-13816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13816"
    },
    {
      "name": "CVE-2017-13798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13798"
    },
    {
      "name": "CVE-2017-11108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11108"
    },
    {
      "name": "CVE-2017-13017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13017"
    },
    {
      "name": "CVE-2017-13831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13831"
    },
    {
      "name": "CVE-2017-11543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11543"
    },
    {
      "name": "CVE-2017-13790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13790"
    },
    {
      "name": "CVE-2017-13000",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13000"
    },
    {
      "name": "CVE-2017-13807",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13807"
    },
    {
      "name": "CVE-2017-13843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13843"
    },
    {
      "name": "CVE-2017-13055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13055"
    },
    {
      "name": "CVE-2017-7668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
    },
    {
      "name": "CVE-2017-13041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13041"
    },
    {
      "name": "CVE-2017-12902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12902"
    },
    {
      "name": "CVE-2017-13834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13834"
    },
    {
      "name": "CVE-2017-13007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13007"
    },
    {
      "name": "CVE-2017-13687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13687"
    },
    {
      "name": "CVE-2017-13078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
    },
    {
      "name": "CVE-2017-12986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12986"
    },
    {
      "name": "CVE-2017-13821",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13821"
    },
    {
      "name": "CVE-2017-13033",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13033"
    },
    {
      "name": "CVE-2017-13817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13817"
    },
    {
      "name": "CVE-2017-13799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13799"
    },
    {
      "name": "CVE-2017-12901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12901"
    },
    {
      "name": "CVE-2017-13832",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13832"
    },
    {
      "name": "CVE-2017-13011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13011"
    },
    {
      "name": "CVE-2017-13046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13046"
    },
    {
      "name": "CVE-2017-13840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13840"
    },
    {
      "name": "CVE-2017-12897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12897"
    },
    {
      "name": "CVE-2017-13809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13809"
    },
    {
      "name": "CVE-2017-13822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13822"
    },
    {
      "name": "CVE-2017-7113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7113"
    },
    {
      "name": "CVE-2017-13800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13800"
    },
    {
      "name": "CVE-2017-13786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13786"
    },
    {
      "name": "CVE-2017-13003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13003"
    },
    {
      "name": "CVE-2017-13815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13815"
    },
    {
      "name": "CVE-2017-13013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13013"
    },
    {
      "name": "CVE-2017-13001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13001"
    },
    {
      "name": "CVE-2017-13009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13009"
    },
    {
      "name": "CVE-2017-1000101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000101"
    },
    {
      "name": "CVE-2016-8740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8740"
    },
    {
      "name": "CVE-2017-13048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13048"
    },
    {
      "name": "CVE-2017-13054",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13054"
    },
    {
      "name": "CVE-2017-13038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13038"
    },
    {
      "name": "CVE-2017-13841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13841"
    },
    {
      "name": "CVE-2017-13010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13010"
    },
    {
      "name": "CVE-2017-12990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12990"
    },
    {
      "name": "CVE-2017-13783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13783"
    },
    {
      "name": "CVE-2017-13047",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13047"
    },
    {
      "name": "CVE-2017-12991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12991"
    },
    {
      "name": "CVE-2017-13805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13805"
    },
    {
      "name": "CVE-2017-13811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13811"
    },
    {
      "name": "CVE-2017-13849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13849"
    },
    {
      "name": "CVE-2017-13032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13032"
    },
    {
      "name": "CVE-2017-13801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13801"
    },
    {
      "name": "CVE-2017-13051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13051"
    },
    {
      "name": "CVE-2017-13036",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13036"
    },
    {
      "name": "CVE-2017-9788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
    },
    {
      "name": "CVE-2017-13844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13844"
    },
    {
      "name": "CVE-2016-2161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2161"
    },
    {
      "name": "CVE-2017-13795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13795"
    },
    {
      "name": "CVE-2017-13690",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13690"
    },
    {
      "name": "CVE-2017-13838",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13838"
    },
    {
      "name": "CVE-2017-11542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11542"
    },
    {
      "name": "CVE-2017-13842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13842"
    },
    {
      "name": "CVE-2017-12997",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12997"
    },
    {
      "name": "CVE-2017-13045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13045"
    },
    {
      "name": "CVE-2017-13026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13026"
    },
    {
      "name": "CVE-2017-13785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13785"
    },
    {
      "name": "CVE-2016-5387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-5387"
    },
    {
      "name": "CVE-2017-13796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13796"
    },
    {
      "name": "CVE-2017-13782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13782"
    },
    {
      "name": "CVE-2017-13784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13784"
    },
    {
      "name": "CVE-2017-13042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13042"
    },
    {
      "name": "CVE-2017-12992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12992"
    },
    {
      "name": "CVE-2017-13027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13027"
    },
    {
      "name": "CVE-2017-13034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13034"
    },
    {
      "name": "CVE-2017-13794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13794"
    },
    {
      "name": "CVE-2017-13015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13015"
    },
    {
      "name": "CVE-2017-13725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13725"
    },
    {
      "name": "CVE-2017-13819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13819"
    },
    {
      "name": "CVE-2017-13044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13044"
    },
    {
      "name": "CVE-2017-12900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12900"
    },
    {
      "name": "CVE-2017-12994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12994"
    },
    {
      "name": "CVE-2017-12998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12998"
    },
    {
      "name": "CVE-2017-13029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13029"
    },
    {
      "name": "CVE-2017-13037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13037"
    },
    {
      "name": "CVE-2017-13788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13788"
    },
    {
      "name": "CVE-2017-7132",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7132"
    },
    {
      "name": "CVE-2017-13810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13810"
    },
    {
      "name": "CVE-2017-13039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13039"
    },
    {
      "name": "CVE-2017-13791",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13791"
    },
    {
      "name": "CVE-2017-13023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13023"
    },
    {
      "name": "CVE-2017-13020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13020"
    },
    {
      "name": "CVE-2017-13021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13021"
    },
    {
      "name": "CVE-2017-3167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
    },
    {
      "name": "CVE-2017-12896",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12896"
    },
    {
      "name": "CVE-2017-13824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13824"
    },
    {
      "name": "CVE-2017-13049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13049"
    },
    {
      "name": "CVE-2017-12999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12999"
    },
    {
      "name": "CVE-2017-13836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13836"
    },
    {
      "name": "CVE-2017-13823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13823"
    },
    {
      "name": "CVE-2017-13846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13846"
    },
    {
      "name": "CVE-2017-12988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12988"
    },
    {
      "name": "CVE-2017-13789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13789"
    },
    {
      "name": "CVE-2017-12985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12985"
    },
    {
      "name": "CVE-2017-12899",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12899"
    },
    {
      "name": "CVE-2017-7679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
    },
    {
      "name": "CVE-2017-13014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13014"
    },
    {
      "name": "CVE-2017-12894",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12894"
    },
    {
      "name": "CVE-2017-13804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13804"
    },
    {
      "name": "CVE-2017-13024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13024"
    },
    {
      "name": "CVE-2017-13004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13004"
    },
    {
      "name": "CVE-2017-12996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12996"
    },
    {
      "name": "CVE-2017-13830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13830"
    },
    {
      "name": "CVE-2017-12893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12893"
    },
    {
      "name": "CVE-2017-13019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13019"
    },
    {
      "name": "CVE-2017-13030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13030"
    },
    {
      "name": "CVE-2017-13808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13808"
    },
    {
      "name": "CVE-2017-13813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13813"
    },
    {
      "name": "CVE-2017-1000100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000100"
    },
    {
      "name": "CVE-2017-13053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13053"
    },
    {
      "name": "CVE-2017-13040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13040"
    },
    {
      "name": "CVE-2017-13689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13689"
    },
    {
      "name": "CVE-2017-11103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11103"
    },
    {
      "name": "CVE-2017-13005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13005"
    },
    {
      "name": "CVE-2017-13793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13793"
    },
    {
      "name": "CVE-2017-13814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13814"
    },
    {
      "name": "CVE-2017-12987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12987"
    },
    {
      "name": "CVE-2017-13826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13826"
    },
    {
      "name": "CVE-2017-11541",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11541"
    },
    {
      "name": "CVE-2017-13025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13025"
    },
    {
      "name": "CVE-2017-13828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13828"
    },
    {
      "name": "CVE-2017-13688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13688"
    },
    {
      "name": "CVE-2017-13820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13820"
    },
    {
      "name": "CVE-2017-12995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12995"
    },
    {
      "name": "CVE-2017-13792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13792"
    },
    {
      "name": "CVE-2017-13031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13031"
    },
    {
      "name": "CVE-2017-13028",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13028"
    },
    {
      "name": "CVE-2017-13825",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13825"
    },
    {
      "name": "CVE-2016-8743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
    },
    {
      "name": "CVE-2017-13803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13803"
    },
    {
      "name": "CVE-2017-13006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13006"
    },
    {
      "name": "CVE-2017-12895",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12895"
    },
    {
      "name": "CVE-2017-13812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13812"
    },
    {
      "name": "CVE-2017-13022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13022"
    },
    {
      "name": "CVE-2017-13012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13012"
    },
    {
      "name": "CVE-2017-13002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13002"
    },
    {
      "name": "CVE-2017-13035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13035"
    },
    {
      "name": "CVE-2017-12989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12989"
    },
    {
      "name": "CVE-2017-13077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
    },
    {
      "name": "CVE-2017-13016",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13016"
    },
    {
      "name": "CVE-2017-13080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
    },
    {
      "name": "CVE-2017-12898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-12898"
    },
    {
      "name": "CVE-2017-13008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-13008"
    }
  ],
  "initial_release_date": "2017-11-02T00:00:00",
  "last_revision_date": "2017-11-02T00:00:00",
  "links": [],
  "reference": "CERTFR-2017-AVI-385",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2017-11-02T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple\n. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208225 du 31 octobre 2017",
      "url": "https://support.apple.com/en-us/HT208225"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208222 du 31 octobre 2017",
      "url": "https://support.apple.com/en-us/HT208222"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208219 du 31 octobre 2017",
      "url": "https://support.apple.com/en-us/HT208219"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208223 du 31 octobre 2017",
      "url": "https://support.apple.com/en-us/HT208223"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208220 du 31 octobre 2017",
      "url": "https://support.apple.com/en-us/HT208220"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208221 du 31 octobre 2017",
      "url": "https://support.apple.com/en-us/HT208221"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208224 du 31 octobre 2017",
      "url": "https://support.apple.com/en-us/HT208224"
    }
  ]
}
  CERTFR-2018-AVI-026
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D232 sur QFX5200/5110 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.1 antérieures à 17.1R2-S5, 17.1R3 et 17.1R3 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R6 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D70, 15.1X53-D231 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1 antérieures à 14.1R9 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 antérieures à 16.2R2, 16.2R2-S2, 16.2R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 antérieures à 14.2R8 | ||
| N/A | N/A | CTPView versions 7.1, 7.2 et 7.3. | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1F6, 15.1R3 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1R6-S2, 15.1R7 | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R5-S1, 16.1R6 | ||
| Juniper Networks | Junos Space | Junos Space antérieures à 17.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 antérieures à 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.2 antérieures à 16.2R3 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 versions 15.1X49-D100 et supérieures mais antérieures à 15.1X49-D121 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 antérieures à 14.1X53-D40 sur QFX, EX | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 antérieures à 14.2R8 sur MX series | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 antérieures à 12.1X46-D71 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X49 antérieures à 15.1X49-D110 sur SRX | ||
| N/A | N/A | ScreenOS toutes versions sans le dernier correctif de sécurité | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1X65 antérieures à 16.1X65-D45 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1 antérieures à 14.1R8-S5, 14.1R9 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D55 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1R5-S4, 15.1R5-S5 et 15.1R6 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46 antérieures à 12.1X46-D71 sur SRX | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3 antérieures à 12.3R12-S7 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53 antérieures à 14.1X53-D46, 14.1X53-D50 et 14.1X53-D107 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3R antérieures à 12.3R12-S7 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 antérieures à 12.3X48-D55 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3R12 antérieures à 12.3R12-S7 | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48 versions 12.3X48-D55 et supérieures mais antérieures à 12.3X48-D65 | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75 antérieures à 17.2X75-D50 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D49, 15.1X53-D470 sur NFX | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53 antérieures à 15.1X53-D65 sur QFX10K | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1 antérieures à 16.1R3-S6, 16.1R4-S6 et 16.1R5 | ||
| ESET | Security | Security Director et Log Collector antérieures à 17.2R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 14.2 antérieures à 14.2R7-S9, 14.2R8 | 
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
                  
  | 
              ||||||||||||||||||||||||||||||||||||||||||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D232 sur QFX5200/5110",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 17.1 ant\u00e9rieures \u00e0 17.1R2-S5, 17.1R3 et 17.1R3 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F2-S17, 15.1F5-S8, 15.1F6-S8, 15.1R5-S7, 15.1R7",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R6 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D70, 15.1X53-D231",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.1 ant\u00e9rieures \u00e0 14.1R9 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R2, 16.2R2-S2, 16.2R3",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R8",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "CTPView versions 7.1, 7.2 et 7.3.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1F5-S8, 15.1F6-S8, 15.1R5-S6, 15.1R6-S3, 15.1R7, 15.1F6, 15.1R3",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R6-S2, 15.1R7",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R5-S1, 16.1R6",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos Space ant\u00e9rieures \u00e0 17.2R1",
      "product": {
        "name": "Junos Space",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1 ant\u00e9rieures \u00e0 15.1R5-S8, 15.1F6-S9, 15.1R6-S4, 15.1R7 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.2 ant\u00e9rieures \u00e0 16.2R3 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X49 versions 15.1X49-D100 et sup\u00e9rieures mais ant\u00e9rieures \u00e0 15.1X49-D121",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.1X53 ant\u00e9rieures \u00e0 14.1X53-D40 sur QFX, EX",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R8 sur MX series",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.1X46 ant\u00e9rieures \u00e0 12.1X46-D71",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X49 ant\u00e9rieures \u00e0 15.1X49-D110 sur SRX",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "ScreenOS toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.1X65 ant\u00e9rieures \u00e0 16.1X65-D45",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.1 ant\u00e9rieures \u00e0 14.1R8-S5, 14.1R9",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D55 sur SRX",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1R5-S4, 15.1R5-S5 et 15.1R6",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.1X46 ant\u00e9rieures \u00e0 12.1X46-D71 sur SRX",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3 ant\u00e9rieures \u00e0 12.3R12-S7",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.1X53 ant\u00e9rieures \u00e0 14.1X53-D46, 14.1X53-D50 et 14.1X53-D107",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3R ant\u00e9rieures \u00e0 12.3R12-S7",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3X48 ant\u00e9rieures \u00e0 12.3X48-D55",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3R12 ant\u00e9rieures \u00e0 12.3R12-S7",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 12.3X48 versions 12.3X48-D55 et sup\u00e9rieures mais ant\u00e9rieures \u00e0 12.3X48-D65",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 17.2X75 ant\u00e9rieures \u00e0 17.2X75-D50",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D49, 15.1X53-D470 sur NFX",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 15.1X53 ant\u00e9rieures \u00e0 15.1X53-D65 sur QFX10K",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 16.1 ant\u00e9rieures \u00e0 16.1R3-S6, 16.1R4-S6 et 16.1R5",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Security Director et Log Collector ant\u00e9rieures \u00e0 17.2R1",
      "product": {
        "name": "Security",
        "vendor": {
          "name": "ESET",
          "scada": false
        }
      }
    },
    {
      "description": "Junos OS versions 14.2 ant\u00e9rieures \u00e0 14.2R7-S9, 14.2R8",
      "product": {
        "name": "Junos OS",
        "vendor": {
          "name": "Juniper Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2017-3169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
    },
    {
      "name": "CVE-2017-14106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-14106"
    },
    {
      "name": "CVE-2018-0002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0002"
    },
    {
      "name": "CVE-2015-5600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
    },
    {
      "name": "CVE-2018-0008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0008"
    },
    {
      "name": "CVE-2015-6563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-6563"
    },
    {
      "name": "CVE-2018-0013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0013"
    },
    {
      "name": "CVE-2015-6564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-6564"
    },
    {
      "name": "CVE-2015-7236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7236"
    },
    {
      "name": "CVE-2017-7668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
    },
    {
      "name": "CVE-2017-9798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
    },
    {
      "name": "CVE-2018-0011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0011"
    },
    {
      "name": "CVE-2016-2141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-2141"
    },
    {
      "name": "CVE-2015-7501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501"
    },
    {
      "name": "CVE-2015-5304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5304"
    },
    {
      "name": "CVE-2018-0012",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0012"
    },
    {
      "name": "CVE-2018-0003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0003"
    },
    {
      "name": "CVE-2017-9788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
    },
    {
      "name": "CVE-2015-5174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5174"
    },
    {
      "name": "CVE-2017-1000112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000112"
    },
    {
      "name": "CVE-2016-8858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8858"
    },
    {
      "name": "CVE-2017-5664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5664"
    },
    {
      "name": "CVE-2017-1000111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000111"
    },
    {
      "name": "CVE-2017-6074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-6074"
    },
    {
      "name": "CVE-2017-5645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-5645"
    },
    {
      "name": "CVE-2018-0010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0010"
    },
    {
      "name": "CVE-2018-0005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0005"
    },
    {
      "name": "CVE-2018-0007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0007"
    },
    {
      "name": "CVE-2016-8655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8655"
    },
    {
      "name": "CVE-2017-3167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
    },
    {
      "name": "CVE-2015-5188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5188"
    },
    {
      "name": "CVE-2018-0009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0009"
    },
    {
      "name": "CVE-2017-7679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
    },
    {
      "name": "CVE-2018-0004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0004"
    },
    {
      "name": "CVE-2018-0014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0014"
    },
    {
      "name": "CVE-2017-2634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-2634"
    },
    {
      "name": "CVE-2016-8743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
    },
    {
      "name": "CVE-2015-5220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-5220"
    },
    {
      "name": "CVE-2018-0006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0006"
    },
    {
      "name": "CVE-2018-0001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-0001"
    }
  ],
  "initial_release_date": "2018-01-11T00:00:00",
  "last_revision_date": "2018-01-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2018-AVI-026",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2018-01-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10838 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10838\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10831 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10831\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10835 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10835\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10833 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10833\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10837 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10837\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10841 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10841\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10828 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10828\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10834 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10834\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10829 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10829\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10836 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10836\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10839 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10839\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10830 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10830\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10832 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10832\u0026cat=SIRT_1\u0026actp=LIST"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10840 du 10 janvier 2018",
      "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10840\u0026cat=SIRT_1\u0026actp=LIST"
    }
  ]
}
  CERTFR-2019-AVI-657
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Tenable.sc de Tenable. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
                  
  | 
              |||||
{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Tenable.sc versions ant\u00e9rieures \u00e0 5.13.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Tenable",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2017-3169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169"
    },
    {
      "name": "CVE-2017-7659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7659"
    },
    {
      "name": "CVE-2018-1333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1333"
    },
    {
      "name": "CVE-2017-7668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668"
    },
    {
      "name": "CVE-2017-9798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9798"
    },
    {
      "name": "CVE-2018-1283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1283"
    },
    {
      "name": "CVE-2018-1312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1312"
    },
    {
      "name": "CVE-2019-1552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1552"
    },
    {
      "name": "CVE-2018-1301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1301"
    },
    {
      "name": "CVE-2017-9788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788"
    },
    {
      "name": "CVE-2018-17189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17189"
    },
    {
      "name": "CVE-2019-1547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1547"
    },
    {
      "name": "CVE-2019-1563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
    },
    {
      "name": "CVE-2018-17199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-17199"
    },
    {
      "name": "CVE-2018-1303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1303"
    },
    {
      "name": "CVE-2017-3167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167"
    },
    {
      "name": "CVE-2017-7679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679"
    },
    {
      "name": "CVE-2017-15710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-15710"
    },
    {
      "name": "CVE-2018-1302",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1302"
    },
    {
      "name": "CVE-2019-3465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-3465"
    },
    {
      "name": "CVE-2017-15715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-15715"
    },
    {
      "name": "CVE-2019-1551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-1551"
    },
    {
      "name": "CVE-2018-11763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-11763"
    }
  ],
  "initial_release_date": "2019-12-31T00:00:00",
  "last_revision_date": "2019-12-31T00:00:00",
  "links": [],
  "reference": "CERTFR-2019-AVI-657",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2019-12-31T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Tenable.sc de\nTenable. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Tenable.sc",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Tenable tns-2019-09 du 30 d\u00e9cembre 2019",
      "url": "https://fr.tenable.com/security/tns-2019-09"
    }
  ]
}
  var-201707-1241
Vulnerability from variot
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service. Apache HTTP Server Contains an input validation vulnerability and an information disclosure vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. Apache HTTP Server is prone to a memory-corruption vulnerability. Attackers can exploit this issue to cause to obtain sensitive information or cause denial-of-service conditions. Versions prior to Apache httpd 2.2.34 and 2.4.27 are vulnerable. (CVE-2017-7679)
- A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. (CVE-2017-9798)
 
Red Hat would like to thank Hanno BAPck for reporting CVE-2017-9798.
This release provides an update to httpd and OpenSSL. The updates are documented in the Release Notes document linked to in the References.
OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
This release of JBoss Enterprise Application Platform 6.4.18 Natives serves as a replacement of the JBoss Enterprise Application Platform 6.4.16 Natives and includes bug fixes which are documented in the Release Notes document linked to in the References. (CVE-2017-9788)
- A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. Upstream acknowledges Karthikeyan Bhargavan (Inria) and GaA<<tan Leurent (Inria) as the original reporters of CVE-2016-2183.
 
Bug Fix(es):
- 
CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)
 - 
mod_cluster segfaults in process_info() due to wrongly generated assembler instruction movslq (BZ#1508884)
 - 
Corruption in nodestatsmem in multiple core dumps but in different functions of each core dump. (BZ#1508885)
 - 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. The JBoss server process must be restarted for the update to take effect. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
 
===================================================================== Red Hat Security Advisory
Synopsis: Important: httpd security update Advisory ID: RHSA-2017:2478-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2478 Issue date: 2017-08-15 CVE Names: CVE-2017-3167 CVE-2017-3169 CVE-2017-7679 CVE-2017-9788 =====================================================================
- Summary:
 
An update for httpd is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
 
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64
Security Fix(es):
- 
It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788)
 - 
It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167)
 - 
A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169)
 - 
A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)
 - 
Solution:
 
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, the httpd daemon will be restarted automatically.
- Bugs fixed (https://bugzilla.redhat.com/):
 
1463194 - CVE-2017-3167 httpd: ap_get_basic_auth_pw() authentication bypass 1463197 - CVE-2017-3169 httpd: mod_ssl NULL pointer dereference 1463207 - CVE-2017-7679 httpd: mod_mime buffer overread 1470748 - CVE-2017-9788 httpd: Uninitialized memory reflection in mod_auth_digest
- Package List:
 
Red Hat Enterprise Linux Desktop (v. 6):
Source: httpd-2.2.15-60.el6_9.5.src.rpm
i386: httpd-2.2.15-60.el6_9.5.i686.rpm httpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm httpd-tools-2.2.15-60.el6_9.5.i686.rpm
x86_64: httpd-2.2.15-60.el6_9.5.x86_64.rpm httpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm httpd-tools-2.2.15-60.el6_9.5.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: httpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm httpd-devel-2.2.15-60.el6_9.5.i686.rpm mod_ssl-2.2.15-60.el6_9.5.i686.rpm
noarch: httpd-manual-2.2.15-60.el6_9.5.noarch.rpm
x86_64: httpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm httpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm httpd-devel-2.2.15-60.el6_9.5.i686.rpm httpd-devel-2.2.15-60.el6_9.5.x86_64.rpm mod_ssl-2.2.15-60.el6_9.5.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: httpd-2.2.15-60.el6_9.5.src.rpm
x86_64: httpd-2.2.15-60.el6_9.5.x86_64.rpm httpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm httpd-tools-2.2.15-60.el6_9.5.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
noarch: httpd-manual-2.2.15-60.el6_9.5.noarch.rpm
x86_64: httpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm httpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm httpd-devel-2.2.15-60.el6_9.5.i686.rpm httpd-devel-2.2.15-60.el6_9.5.x86_64.rpm mod_ssl-2.2.15-60.el6_9.5.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: httpd-2.2.15-60.el6_9.5.src.rpm
i386: httpd-2.2.15-60.el6_9.5.i686.rpm httpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm httpd-devel-2.2.15-60.el6_9.5.i686.rpm httpd-tools-2.2.15-60.el6_9.5.i686.rpm mod_ssl-2.2.15-60.el6_9.5.i686.rpm
noarch: httpd-manual-2.2.15-60.el6_9.5.noarch.rpm
ppc64: httpd-2.2.15-60.el6_9.5.ppc64.rpm httpd-debuginfo-2.2.15-60.el6_9.5.ppc.rpm httpd-debuginfo-2.2.15-60.el6_9.5.ppc64.rpm httpd-devel-2.2.15-60.el6_9.5.ppc.rpm httpd-devel-2.2.15-60.el6_9.5.ppc64.rpm httpd-tools-2.2.15-60.el6_9.5.ppc64.rpm mod_ssl-2.2.15-60.el6_9.5.ppc64.rpm
s390x: httpd-2.2.15-60.el6_9.5.s390x.rpm httpd-debuginfo-2.2.15-60.el6_9.5.s390.rpm httpd-debuginfo-2.2.15-60.el6_9.5.s390x.rpm httpd-devel-2.2.15-60.el6_9.5.s390.rpm httpd-devel-2.2.15-60.el6_9.5.s390x.rpm httpd-tools-2.2.15-60.el6_9.5.s390x.rpm mod_ssl-2.2.15-60.el6_9.5.s390x.rpm
x86_64: httpd-2.2.15-60.el6_9.5.x86_64.rpm httpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm httpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm httpd-devel-2.2.15-60.el6_9.5.i686.rpm httpd-devel-2.2.15-60.el6_9.5.x86_64.rpm httpd-tools-2.2.15-60.el6_9.5.x86_64.rpm mod_ssl-2.2.15-60.el6_9.5.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: httpd-2.2.15-60.el6_9.5.src.rpm
i386: httpd-2.2.15-60.el6_9.5.i686.rpm httpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm httpd-devel-2.2.15-60.el6_9.5.i686.rpm httpd-tools-2.2.15-60.el6_9.5.i686.rpm mod_ssl-2.2.15-60.el6_9.5.i686.rpm
noarch: httpd-manual-2.2.15-60.el6_9.5.noarch.rpm
x86_64: httpd-2.2.15-60.el6_9.5.x86_64.rpm httpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm httpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm httpd-devel-2.2.15-60.el6_9.5.i686.rpm httpd-devel-2.2.15-60.el6_9.5.x86_64.rpm httpd-tools-2.2.15-60.el6_9.5.x86_64.rpm mod_ssl-2.2.15-60.el6_9.5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
 
https://access.redhat.com/security/cve/CVE-2017-3167 https://access.redhat.com/security/cve/CVE-2017-3169 https://access.redhat.com/security/cve/CVE-2017-7679 https://access.redhat.com/security/cve/CVE-2017-9788 https://access.redhat.com/security/updates/classification/#important
- Contact:
 
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFZkzq3XlSAg2UNWIIRAjxIAJ9JoJcSMguc2VTpgJl2P5BGoM2IrACfXd/8 Jxb2g1bdehw6Jjq0qF13AEM= =ZvYI -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. An httpd module using this API function could consequently allow access that should have been denied. JIRA issues fixed (https://issues.jboss.org/):
JBCS-329 - Unable to load large CRL openssl problem JBCS-337 - Errata for httpd 2.4.23 SP2 RHEL 6
Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. (CVE-2017-9788)
- 
A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615)
 - 
A vulnerability was discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution.
 
The References section of this erratum contains a download link (you must log in to download the update)
Show details on source website{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201707-1241",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "jboss enterprise web server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "2.0.0"
      },
      {
        "model": "enterprise linux server eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.7"
      },
      {
        "model": "enterprise linux server eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.5"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "jboss enterprise application platform",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0.0"
      },
      {
        "model": "jboss enterprise application platform",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.4.0"
      },
      {
        "model": "storage automation store",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.2"
      },
      {
        "model": "enterprise linux server eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "secure global desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "5.3"
      },
      {
        "model": "oncommand unified manager",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "model": "jboss core services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "1.0"
      },
      {
        "model": "http server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "apache",
        "version": "2.2.33"
      },
      {
        "model": "http server",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "apache",
        "version": "2.4.0"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.2"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "6.0"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "enterprise linux server tus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "8.0"
      },
      {
        "model": "enterprise linux server eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.4"
      },
      {
        "model": "enterprise linux server eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.2"
      },
      {
        "model": "enterprise linux server aus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.3"
      },
      {
        "model": "enterprise linux server eus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "redhat",
        "version": "7.6"
      },
      {
        "model": "mac os x",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.13.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "9.0"
      },
      {
        "model": "http server",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "apache",
        "version": "2.4.26"
      },
      {
        "model": "http server",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "apache",
        "version": "2.4.x"
      },
      {
        "model": "spoolserver/winspool series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "nec",
        "version": "reportfiling ver5.2 ~ 6.1"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apache",
        "version": "2.4.27"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apache",
        "version": "2.4.10"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apache",
        "version": "2.4.6"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apache",
        "version": "2.4.4"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apache",
        "version": "2.4.2"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apache",
        "version": "2.4.9"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apache",
        "version": "2.4.1"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apache",
        "version": "2.4.12"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apache",
        "version": "2.2.32"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apache",
        "version": "2.4.3"
      },
      {
        "model": "http server",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apache",
        "version": "2.4.7"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "17.04"
      },
      {
        "model": "linux lts",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "16.04"
      },
      {
        "model": "linux lts",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ubuntu",
        "version": "14.04"
      },
      {
        "model": "enterprise linux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux hpc node optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux hpc node",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux desktop optional",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "enterprise linux desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "centos",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "centos",
        "version": "6"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.26"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.25"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.23"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.20"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.19"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.18"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.17"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.16"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.14"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.12"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.11"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.10"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.5"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.4"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.33"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.26"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.25"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.24"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.23"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.15"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.14"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.13"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.12"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.11"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.10"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.9"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.8"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.6"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.5"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.4"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.3"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.2"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.9"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.8"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.7"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.6"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.3"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.24"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.2"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.13"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.1"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.0"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.32"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.29"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.22"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.21"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.20"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.19"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.18"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.17"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.16"
      },
      {
        "model": "apache",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.1"
      },
      {
        "model": "apache",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.2.34"
      },
      {
        "model": "apache",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apache",
        "version": "2.4.27"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "99569"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9788"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:apache:http_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:nec:spoolserver_winspool",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "145017"
      },
      {
        "db": "PACKETSTORM",
        "id": "144960"
      },
      {
        "db": "PACKETSTORM",
        "id": "145018"
      },
      {
        "db": "PACKETSTORM",
        "id": "143766"
      },
      {
        "db": "PACKETSTORM",
        "id": "144135"
      },
      {
        "db": "PACKETSTORM",
        "id": "144865"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2017-9788",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-9788",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.4,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-117991",
            "impactScore": 4.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-9788",
            "impactScore": 5.2,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-9788",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-9788",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201706-931",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-117991",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-9788",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-117991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-9788"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9788"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service. Apache HTTP Server Contains an input validation vulnerability and an information disclosure vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. Apache HTTP Server is prone to a memory-corruption vulnerability. \nAttackers can exploit this issue to cause to obtain sensitive   information or cause denial-of-service   conditions. \nVersions prior to Apache httpd 2.2.34 and 2.4.27 are vulnerable. (CVE-2017-7679)\n\n* A use-after-free flaw was found in the way httpd handled invalid and\npreviously unregistered HTTP methods specified in the Limit directive used\nin an .htaccess file. (CVE-2017-9798)\n\nRed Hat would like to thank Hanno BAPck for reporting CVE-2017-9798. \n\nThis release provides an update to httpd and OpenSSL. The updates are\ndocumented in the Release Notes document linked to in the References. \n\nOpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and\nTransport Layer Security (TLS) protocols, as well as a full-strength\ngeneral-purpose cryptography library. \n\nThis release of JBoss Enterprise Application Platform 6.4.18 Natives serves\nas a replacement of the JBoss Enterprise Application Platform 6.4.16\nNatives and includes bug fixes which are documented in the Release Notes\ndocument linked to in the References. \n(CVE-2017-9788)\n\n* A flaw was found in the way the DES/3DES cipher was used as part of the\nTLS/SSL protocol. A man-in-the-middle attacker could use this flaw to\nrecover some plaintext data by capturing large amounts of encrypted traffic\nbetween TLS/SSL server and client if the communication used a DES/3DES\nbased ciphersuite. Upstream acknowledges Karthikeyan\nBhargavan (Inria) and GaA\u003c\u003ctan Leurent (Inria) as the original reporters of\nCVE-2016-2183. \n\nBug Fix(es):\n\n* CRL checking of very large CRLs fails with OpenSSL 1.0.2 (BZ#1508880)\n\n* mod_cluster segfaults in process_info() due to wrongly generated\nassembler instruction movslq (BZ#1508884)\n\n* Corruption in nodestatsmem in multiple core dumps but in different\nfunctions of each core dump. (BZ#1508885)\n\n4. For the update to take effect, all services linked to the\nOpenSSL library must be restarted, or the system rebooted. The JBoss server\nprocess must be restarted for the update to take effect. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Important: httpd security update\nAdvisory ID:       RHSA-2017:2478-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2017:2478\nIssue date:        2017-08-15\nCVE Names:         CVE-2017-3167 CVE-2017-3169 CVE-2017-7679 \n                   CVE-2017-9788 \n=====================================================================\n\n1. Summary:\n\nAn update for httpd is now available for Red Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64\n\n3. \n\nSecurity Fix(es):\n\n* It was discovered that the httpd\u0027s mod_auth_digest module did not\nproperly initialize memory before using it when processing certain headers\nrelated to digest authentication. A remote attacker could possibly use this\nflaw to disclose potentially sensitive information or cause httpd child\nprocess to crash by sending specially crafted requests to a server. \n(CVE-2017-9788)\n\n* It was discovered that the use of httpd\u0027s ap_get_basic_auth_pw() API\nfunction outside of the authentication phase could lead to authentication\nbypass. A remote attacker could possibly use this flaw to bypass required\nauthentication if the API was used incorrectly by one of the modules used\nby httpd. (CVE-2017-3167)\n\n* A NULL pointer dereference flaw was found in the httpd\u0027s mod_ssl module. \nA remote attacker could use this flaw to cause an httpd child process to\ncrash if another module used by httpd called a certain API function during\nthe processing of an HTTPS request. (CVE-2017-3169)\n\n* A buffer over-read flaw was found in the httpd\u0027s mod_mime module. A user\npermitted to modify httpd\u0027s MIME configuration could use this flaw to cause\nhttpd child process to crash. (CVE-2017-7679)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1463194 - CVE-2017-3167 httpd: ap_get_basic_auth_pw() authentication bypass\n1463197 - CVE-2017-3169 httpd: mod_ssl NULL pointer dereference\n1463207 - CVE-2017-7679 httpd: mod_mime buffer overread\n1470748 - CVE-2017-9788 httpd: Uninitialized memory reflection in mod_auth_digest\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nhttpd-2.2.15-60.el6_9.5.src.rpm\n\ni386:\nhttpd-2.2.15-60.el6_9.5.i686.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm\nhttpd-tools-2.2.15-60.el6_9.5.i686.rpm\n\nx86_64:\nhttpd-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-tools-2.2.15-60.el6_9.5.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nhttpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm\nhttpd-devel-2.2.15-60.el6_9.5.i686.rpm\nmod_ssl-2.2.15-60.el6_9.5.i686.rpm\n\nnoarch:\nhttpd-manual-2.2.15-60.el6_9.5.noarch.rpm\n\nx86_64:\nhttpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-devel-2.2.15-60.el6_9.5.i686.rpm\nhttpd-devel-2.2.15-60.el6_9.5.x86_64.rpm\nmod_ssl-2.2.15-60.el6_9.5.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nhttpd-2.2.15-60.el6_9.5.src.rpm\n\nx86_64:\nhttpd-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-tools-2.2.15-60.el6_9.5.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nnoarch:\nhttpd-manual-2.2.15-60.el6_9.5.noarch.rpm\n\nx86_64:\nhttpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-devel-2.2.15-60.el6_9.5.i686.rpm\nhttpd-devel-2.2.15-60.el6_9.5.x86_64.rpm\nmod_ssl-2.2.15-60.el6_9.5.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nhttpd-2.2.15-60.el6_9.5.src.rpm\n\ni386:\nhttpd-2.2.15-60.el6_9.5.i686.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm\nhttpd-devel-2.2.15-60.el6_9.5.i686.rpm\nhttpd-tools-2.2.15-60.el6_9.5.i686.rpm\nmod_ssl-2.2.15-60.el6_9.5.i686.rpm\n\nnoarch:\nhttpd-manual-2.2.15-60.el6_9.5.noarch.rpm\n\nppc64:\nhttpd-2.2.15-60.el6_9.5.ppc64.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.ppc.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.ppc64.rpm\nhttpd-devel-2.2.15-60.el6_9.5.ppc.rpm\nhttpd-devel-2.2.15-60.el6_9.5.ppc64.rpm\nhttpd-tools-2.2.15-60.el6_9.5.ppc64.rpm\nmod_ssl-2.2.15-60.el6_9.5.ppc64.rpm\n\ns390x:\nhttpd-2.2.15-60.el6_9.5.s390x.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.s390.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.s390x.rpm\nhttpd-devel-2.2.15-60.el6_9.5.s390.rpm\nhttpd-devel-2.2.15-60.el6_9.5.s390x.rpm\nhttpd-tools-2.2.15-60.el6_9.5.s390x.rpm\nmod_ssl-2.2.15-60.el6_9.5.s390x.rpm\n\nx86_64:\nhttpd-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-devel-2.2.15-60.el6_9.5.i686.rpm\nhttpd-devel-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-tools-2.2.15-60.el6_9.5.x86_64.rpm\nmod_ssl-2.2.15-60.el6_9.5.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nhttpd-2.2.15-60.el6_9.5.src.rpm\n\ni386:\nhttpd-2.2.15-60.el6_9.5.i686.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm\nhttpd-devel-2.2.15-60.el6_9.5.i686.rpm\nhttpd-tools-2.2.15-60.el6_9.5.i686.rpm\nmod_ssl-2.2.15-60.el6_9.5.i686.rpm\n\nnoarch:\nhttpd-manual-2.2.15-60.el6_9.5.noarch.rpm\n\nx86_64:\nhttpd-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.i686.rpm\nhttpd-debuginfo-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-devel-2.2.15-60.el6_9.5.i686.rpm\nhttpd-devel-2.2.15-60.el6_9.5.x86_64.rpm\nhttpd-tools-2.2.15-60.el6_9.5.x86_64.rpm\nmod_ssl-2.2.15-60.el6_9.5.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-3167\nhttps://access.redhat.com/security/cve/CVE-2017-3169\nhttps://access.redhat.com/security/cve/CVE-2017-7679\nhttps://access.redhat.com/security/cve/CVE-2017-9788\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFZkzq3XlSAg2UNWIIRAjxIAJ9JoJcSMguc2VTpgJl2P5BGoM2IrACfXd/8\nJxb2g1bdehw6Jjq0qF13AEM=\n=ZvYI\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. This software, such as Apache HTTP Server, is\ncommon to multiple JBoss middleware products, and is packaged under Red Hat\nJBoss Core Services to allow for faster distribution of updates, and for a\nmore consistent update experience. An httpd module using\nthis API function could consequently allow access that should have been\ndenied. JIRA issues fixed (https://issues.jboss.org/):\n\nJBCS-329 - Unable to load large CRL openssl problem\nJBCS-337 - Errata for httpd 2.4.23 SP2 RHEL 6\n\n7. \n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies. \n(CVE-2017-9788)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was\nconfigured with readonly=false and HTTP PUT requests were allowed, an\nattacker could upload a JSP file to that context and achieve code\nexecution. (CVE-2017-12615)\n\n* A vulnerability was discovered in Tomcat where if a servlet context was\nconfigured with readonly=false and HTTP PUT requests were allowed, an\nattacker could upload a JSP file to that context and achieve code\nexecution. \n\nThe References section of this erratum contains a download link (you must\nlog in to download the update)",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-9788"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      },
      {
        "db": "BID",
        "id": "99569"
      },
      {
        "db": "VULHUB",
        "id": "VHN-117991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-9788"
      },
      {
        "db": "PACKETSTORM",
        "id": "143358"
      },
      {
        "db": "PACKETSTORM",
        "id": "145017"
      },
      {
        "db": "PACKETSTORM",
        "id": "144960"
      },
      {
        "db": "PACKETSTORM",
        "id": "145018"
      },
      {
        "db": "PACKETSTORM",
        "id": "143766"
      },
      {
        "db": "PACKETSTORM",
        "id": "144135"
      },
      {
        "db": "PACKETSTORM",
        "id": "144865"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-9788",
        "trust": 3.6
      },
      {
        "db": "BID",
        "id": "99569",
        "trust": 2.0
      },
      {
        "db": "TENABLE",
        "id": "TNS-2019-09",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1038906",
        "trust": 1.7
      },
      {
        "db": "JVN",
        "id": "JVNVU92256772",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-931",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "143358",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "143534",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "143615",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-117991",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-9788",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145017",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144960",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "145018",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "143766",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144135",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144865",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-117991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-9788"
      },
      {
        "db": "BID",
        "id": "99569"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      },
      {
        "db": "PACKETSTORM",
        "id": "143358"
      },
      {
        "db": "PACKETSTORM",
        "id": "145017"
      },
      {
        "db": "PACKETSTORM",
        "id": "144960"
      },
      {
        "db": "PACKETSTORM",
        "id": "145018"
      },
      {
        "db": "PACKETSTORM",
        "id": "143766"
      },
      {
        "db": "PACKETSTORM",
        "id": "144135"
      },
      {
        "db": "PACKETSTORM",
        "id": "144865"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9788"
      }
    ]
  },
  "id": "VAR-201707-1241",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-117991"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-29T22:03:41.503000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Fixed in Apache httpd 2.2.34",
        "trust": 0.8,
        "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
      },
      {
        "title": "Fixed in Apache httpd 2.4.27",
        "trust": 0.8,
        "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
      },
      {
        "title": "NV17-018",
        "trust": 0.8,
        "url": "http://jpn.nec.com/security-info/secinfo/nv17-018.html"
      },
      {
        "title": "CVE-2017-9788: Uninitialized memory reflection in mod_auth_digest",
        "trust": 0.8,
        "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3Cannounce.httpd.apache.org%3E"
      },
      {
        "title": "Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=89486"
      },
      {
        "title": "Red Hat: Important: Red Hat JBoss Core Services security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172710 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: Red Hat JBoss Core Services security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172709 - Security Advisory"
      },
      {
        "title": "Ubuntu Security Notice: apache2 vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3370-2"
      },
      {
        "title": "Red Hat: Important: Red Hat JBoss Core Services security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20172708 - Security Advisory"
      },
      {
        "title": "Debian Security Advisories: DSA-3913-1 apache2 -- security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=d9fddec113878a445ed8009b9b095457"
      },
      {
        "title": "Debian CVElist Bug Report Logs: apache2: CVE-2017-9788",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5acf2d8c1512b0afa80a30a349e7a2c3"
      },
      {
        "title": "Ubuntu Security Notice: apache2 vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3370-1"
      },
      {
        "title": "Red Hat: Important: Red Hat JBoss Enterprise Application Platform 6.4.18 security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20173240 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: httpd security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20173194 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: Red Hat JBoss Enterprise Application Platform 6.4.18 security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20173239 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: httpd security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20173193 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: httpd security update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20173195 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: Red Hat JBoss Web Server security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20173113 - Security Advisory"
      },
      {
        "title": "Red Hat: Important: Red Hat JBoss Web Server security and bug fix update",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20173114 - Security Advisory"
      },
      {
        "title": "Arch Linux Advisories: [ASA-201707-15] apache: multiple issues",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201707-15"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-9788"
      },
      {
        "title": "Amazon Linux AMI: ALAS-2017-892",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2017-892"
      },
      {
        "title": "Symantec Security Advisories: Apache HTTP Server Vulnerabilities Jul 2017 - Sep 2018",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=d2f801f4ee4b743c8db2cea35625dd16"
      },
      {
        "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=a22ad41e97bbfc5abb0bb927bf43089c"
      },
      {
        "title": "Tenable Security Advisories: [R1] Tenable.sc 5.13.0 Fixes Multiple Third-Party Vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2019-09"
      },
      {
        "title": "Oracle: Oracle Critical Patch Update Advisory - October 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=523d3f220a64ff01dd95e064bd37566a"
      },
      {
        "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - July 2017",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=549dc795290b298746065b62b4bb7928"
      },
      {
        "title": "MITRE_NIST",
        "trust": 0.1,
        "url": "https://github.com/ColumbusCollaboratory/MITRE_NIST "
      },
      {
        "title": "tab_pie_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/CredenceID/tab_pie_external_honggfuzz "
      },
      {
        "title": "platform_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/DennissimOS/platform_external_honggfuzz "
      },
      {
        "title": "nrich",
        "trust": 0.1,
        "url": "https://github.com/retr0-13/nrich "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/RoseSecurity-Research/Red-Teaming-TTPs "
      },
      {
        "title": "android_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/khadas/android_external_honggfuzz "
      },
      {
        "title": "android_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/bananadroid/android_external_honggfuzz "
      },
      {
        "title": "android_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/random-aosp-stuff/android_external_honggfuzz "
      },
      {
        "title": "android_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/TheXPerienceProject/android_external_honggfuzz "
      },
      {
        "title": "honggfuzz_READ",
        "trust": 0.1,
        "url": "https://github.com/imbaya2466/honggfuzz_READ "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/ForkLineageOS/external_honggfuzz "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/Wave-Project/external_honggfuzz "
      },
      {
        "title": "Red-Teaming-TTPs",
        "trust": 0.1,
        "url": "https://github.com/RoseSecurity/Red-Teaming-TTPs "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/swordphoenix/external_honggfuzz "
      },
      {
        "title": "platform_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/aosp-caf-upstream/platform_external_honggfuzz "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/crdroid-r/external_honggfuzz "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/yaap/external_honggfuzz "
      },
      {
        "title": "Shodan-nrich",
        "trust": 0.1,
        "url": "https://github.com/PawanKumarPandit/Shodan-nrich "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/TinkerEdgeR-Android/external_honggfuzz "
      },
      {
        "title": "android_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/Corvus-R/android_external_honggfuzz "
      },
      {
        "title": "external-honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/TinkerBoard2-Android/external-honggfuzz "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/Ozone-OS/external_honggfuzz "
      },
      {
        "title": "android_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/StatiXOS/android_external_honggfuzz "
      },
      {
        "title": "android_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/crdroidandroid/android_external_honggfuzz "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/aosp10-public/external_honggfuzz "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/CAF-Extended/external_honggfuzz "
      },
      {
        "title": "android_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/jingpad-bsp/android_external_honggfuzz "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/TinkerBoard-Android/rockchip-android-external-honggfuzz "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/Project-1CE/external_honggfuzz "
      },
      {
        "title": "android_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/ProtonAOSP/android_external_honggfuzz "
      },
      {
        "title": "android_external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/ProtonAOSP-platina/android_external_honggfuzz "
      },
      {
        "title": "external-honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/TinkerBoard-Android/external-honggfuzz "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/Tomoms/android_external_honggfuzz "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/TinkerBoard2-Android/external_honggfuzz "
      },
      {
        "title": "external_honggfuzz",
        "trust": 0.1,
        "url": "https://github.com/HavocR/external_honggfuzz "
      },
      {
        "title": "lllnx",
        "trust": 0.1,
        "url": "https://github.com/lllnx/lllnx "
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/ep-infosec/50_google_honggfuzz "
      },
      {
        "title": "TEC-MBSD2017",
        "trust": 0.1,
        "url": "https://github.com/keloud/TEC-MBSD2017 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2017-9788"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-931"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.9
      },
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-117991"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9788"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/99569"
      },
      {
        "trust": 2.3,
        "url": "http://www.debian.org/security/2017/dsa-3913"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2017:2478"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2017:2710"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2017:3114"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2017:3193"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2017:3239"
      },
      {
        "trust": 1.8,
        "url": "https://access.redhat.com/errata/rhsa-2017:3240"
      },
      {
        "trust": 1.7,
        "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
      },
      {
        "trust": 1.7,
        "url": "https://security.netapp.com/advisory/ntap-20170911-0002/"
      },
      {
        "trust": 1.7,
        "url": "https://support.apple.com/ht208221"
      },
      {
        "trust": 1.7,
        "url": "https://www.tenable.com/security/tns-2019-09"
      },
      {
        "trust": 1.7,
        "url": "https://security.gentoo.org/glsa/201710-32"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2017:2479"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2017:2483"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2017:2708"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2017:2709"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2017:3113"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2017:3194"
      },
      {
        "trust": 1.7,
        "url": "https://access.redhat.com/errata/rhsa-2017:3195"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1038906"
      },
      {
        "trust": 1.6,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbux03908en_us"
      },
      {
        "trust": 1.5,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9788"
      },
      {
        "trust": 1.1,
        "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
      },
      {
        "trust": 1.1,
        "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3cannounce.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-9788"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu92256772/index.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2017-9788"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "trust": 0.6,
        "url": "httpd.apache.org%3e"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "httpd.apache.org/security/vulnerabilities_22.html"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "httpd.apache.org/security/vulnerabilities_24.html"
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3cannounce."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3ccvs."
      },
      {
        "trust": 0.6,
        "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3ccvs."
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2017-9798"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9798"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2183"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/cve/cve-2016-2183"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.4,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.3,
        "url": "http://www.apache.org/"
      },
      {
        "trust": 0.3,
        "url": "https://httpd.apache.org/"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1470748"
      },
      {
        "trust": 0.3,
        "url": "http://seclists.org/oss-sec/2017/q3/127"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/articles/3229231"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2017-7679"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2017-3167"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7679"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3169"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2017-3169"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3167"
      },
      {
        "trust": 0.1,
        "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbux03908en_us"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb@%3cannounce.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3ccvs.httpd.apache.org%3e"
      },
      {
        "trust": 0.1,
        "url": "https://httpd.apache.org/security_report.html"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=appplatform\u0026downloadtype=securitypatches\u0026version=6.4"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-7668"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7668"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-enterprise-application-platform/"
      },
      {
        "trust": 0.1,
        "url": "https://issues.jboss.org/):"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2015-3185"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en/red-hat-jboss-core-services/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3185"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-12617"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver\u0026downloadtype=securitypatches\u0026version=2.1.2"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2017-12615"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12615"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/articles/3227901"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12617"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-117991"
      },
      {
        "db": "BID",
        "id": "99569"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      },
      {
        "db": "PACKETSTORM",
        "id": "143358"
      },
      {
        "db": "PACKETSTORM",
        "id": "145017"
      },
      {
        "db": "PACKETSTORM",
        "id": "144960"
      },
      {
        "db": "PACKETSTORM",
        "id": "145018"
      },
      {
        "db": "PACKETSTORM",
        "id": "143766"
      },
      {
        "db": "PACKETSTORM",
        "id": "144135"
      },
      {
        "db": "PACKETSTORM",
        "id": "144865"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9788"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-117991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-9788"
      },
      {
        "db": "BID",
        "id": "99569"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      },
      {
        "db": "PACKETSTORM",
        "id": "143358"
      },
      {
        "db": "PACKETSTORM",
        "id": "145017"
      },
      {
        "db": "PACKETSTORM",
        "id": "144960"
      },
      {
        "db": "PACKETSTORM",
        "id": "145018"
      },
      {
        "db": "PACKETSTORM",
        "id": "143766"
      },
      {
        "db": "PACKETSTORM",
        "id": "144135"
      },
      {
        "db": "PACKETSTORM",
        "id": "144865"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-931"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-9788"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-13T00:00:00",
        "db": "VULHUB",
        "id": "VHN-117991"
      },
      {
        "date": "2017-07-13T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-9788"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "BID",
        "id": "99569"
      },
      {
        "date": "2017-08-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      },
      {
        "date": "2017-07-13T04:44:44",
        "db": "PACKETSTORM",
        "id": "143358"
      },
      {
        "date": "2017-11-17T00:10:36",
        "db": "PACKETSTORM",
        "id": "145017"
      },
      {
        "date": "2017-11-13T22:23:00",
        "db": "PACKETSTORM",
        "id": "144960"
      },
      {
        "date": "2017-11-17T00:10:45",
        "db": "PACKETSTORM",
        "id": "145018"
      },
      {
        "date": "2017-08-15T22:24:00",
        "db": "PACKETSTORM",
        "id": "143766"
      },
      {
        "date": "2017-09-14T19:50:50",
        "db": "PACKETSTORM",
        "id": "144135"
      },
      {
        "date": "2017-11-02T23:39:48",
        "db": "PACKETSTORM",
        "id": "144865"
      },
      {
        "date": "2017-06-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-931"
      },
      {
        "date": "2017-07-13T16:29:00.227000",
        "db": "NVD",
        "id": "CVE-2017-9788"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-08-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-117991"
      },
      {
        "date": "2023-11-07T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-9788"
      },
      {
        "date": "2017-08-16T08:10:00",
        "db": "BID",
        "id": "99569"
      },
      {
        "date": "2017-10-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      },
      {
        "date": "2021-06-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201706-931"
      },
      {
        "date": "2024-11-21T03:36:50.693000",
        "db": "NVD",
        "id": "CVE-2017-9788"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "144960"
      },
      {
        "db": "PACKETSTORM",
        "id": "143766"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-931"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apache HTTP Server Input validation vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-005787"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201706-931"
      }
    ],
    "trust": 0.6
  }
}
  fkie_cve-2017-9788
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security@apache.org | http://www.debian.org/security/2017/dsa-3913 | Third Party Advisory | |
| security@apache.org | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | Patch, Third Party Advisory | |
| security@apache.org | http://www.securityfocus.com/bid/99569 | Third Party Advisory, VDB Entry | |
| security@apache.org | http://www.securitytracker.com/id/1038906 | Third Party Advisory, VDB Entry | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:2478 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:2479 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:2483 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:2708 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:2709 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:2710 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:3113 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:3114 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:3193 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:3194 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:3195 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:3239 | Third Party Advisory | |
| security@apache.org | https://access.redhat.com/errata/RHSA-2017:3240 | Third Party Advisory | |
| security@apache.org | https://httpd.apache.org/security/vulnerabilities_22.html | Vendor Advisory | |
| security@apache.org | https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory | |
| security@apache.org | https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E | ||
| security@apache.org | https://security.gentoo.org/glsa/201710-32 | Third Party Advisory | |
| security@apache.org | https://security.netapp.com/advisory/ntap-20170911-0002/ | Third Party Advisory | |
| security@apache.org | https://support.apple.com/HT208221 | Third Party Advisory | |
| security@apache.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us | Third Party Advisory | |
| security@apache.org | https://www.tenable.com/security/tns-2019-09 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3913 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99569 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038906 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2478 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2479 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2483 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2708 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2709 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:2710 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3113 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3114 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3193 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3194 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3195 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3239 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:3240 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://httpd.apache.org/security/vulnerabilities_22.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201710-32 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20170911-0002/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT208221 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/tns-2019-09 | 
| Vendor | Product | Version | |
|---|---|---|---|
| apache | http_server | * | |
| apache | http_server | * | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| apple | mac_os_x | * | |
| netapp | oncommand_unified_manager | - | |
| netapp | storage_automation_store | - | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_desktop | 7.0 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_server_aus | 7.2 | |
| redhat | enterprise_linux_server_aus | 7.3 | |
| redhat | enterprise_linux_server_aus | 7.4 | |
| redhat | enterprise_linux_server_aus | 7.6 | |
| redhat | enterprise_linux_server_eus | 6.7 | |
| redhat | enterprise_linux_server_eus | 7.2 | |
| redhat | enterprise_linux_server_eus | 7.3 | |
| redhat | enterprise_linux_server_eus | 7.4 | |
| redhat | enterprise_linux_server_eus | 7.5 | |
| redhat | enterprise_linux_server_eus | 7.6 | |
| redhat | enterprise_linux_server_tus | 7.2 | |
| redhat | enterprise_linux_server_tus | 7.3 | |
| redhat | enterprise_linux_server_tus | 7.4 | |
| redhat | enterprise_linux_server_tus | 7.6 | |
| redhat | enterprise_linux_workstation | 6.0 | |
| redhat | enterprise_linux_workstation | 7.0 | |
| redhat | jboss_core_services | 1.0 | |
| redhat | jboss_enterprise_application_platform | 6.0.0 | |
| redhat | jboss_enterprise_application_platform | 6.4.0 | |
| redhat | jboss_enterprise_web_server | 2.0.0 | |
| redhat | enterprise_linux | 6.0 | |
| redhat | enterprise_linux | 7.0 | |
| oracle | secure_global_desktop | 5.3 | 
{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF02A472-9FEE-4796-B9B6-DEF9FB20AFE1",
              "versionEndIncluding": "2.2.33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4F38A30-B7C6-4F9E-BFE0-B8481B0EAD26",
              "versionEndIncluding": "2.4.26",
              "versionStartIncluding": "2.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C43CA59D-847F-4225-A7A6-02DEB1BB4F64",
              "versionEndExcluding": "10.13.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
              "matchCriteriaId": "3FA5E22C-489B-4C5F-A5F3-C03F45CA8811",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B7A6697-98CC-4E36-93DB-B7160F8399F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C81647C-9A53-481D-A54C-36770A093F90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2466282-51AB-478D-9FF4-FA524265ED2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1ABA871-3271-48E2-A69C-5AD70AF94E53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "681173DF-537E-4A64-8FC7-75F439CCAD0D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:secure_global_desktop:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B4B4E96-1F12-4719-BDB7-4ED5D3DCF9ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type \u0027Digest\u0027 was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no \u0027=\u0027 assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service."
    },
    {
      "lang": "es",
      "value": "En Apache httpd, en versiones anteriores a la 2.2.34 y en versiones 2.4.x anteriores a la 2.4.27, el valor placeholder en cabeceras [Proxy-]Authorization del tipo \u0027Digest\u0027 no se inicializ\u00f3 o reinici\u00f3 antes de o entre las asignaciones sucesivas key=value por mod_auth_digest. Proporcionar una clave inicial sin asignaci\u00f3n \"=\" podr\u00eda reflejar el valor obsoleto de la memoria agrupada no inicializada utilizada por la petici\u00f3n anterior. Esto podr\u00eda dar lugar al filtrado de informaci\u00f3n potencialmente confidencial y, en otros casos, a un fallo de segmentaci\u00f3n que dar\u00eda como resultado una denegaci\u00f3n de servicio (DoS)"
    }
  ],
  "id": "CVE-2017-9788",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-07-13T16:29:00.227",
  "references": [
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2017/dsa-3913"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99569"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038906"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2478"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2479"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2483"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2708"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2709"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2710"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3113"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3114"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3193"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3194"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3195"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3239"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3240"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201710-32"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20170911-0002/"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/HT208221"
    },
    {
      "source": "security@apache.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us"
    },
    {
      "source": "security@apache.org",
      "url": "https://www.tenable.com/security/tns-2019-09"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2017/dsa-3913"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99569"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038906"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2709"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2710"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3113"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3114"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3193"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3195"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3240"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://httpd.apache.org/security/vulnerabilities_22.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201710-32"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20170911-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.apple.com/HT208221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03908en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.tenable.com/security/tns-2019-09"
    }
  ],
  "sourceIdentifier": "security@apache.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        },
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.